Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-14104 (GCVE-0-2025-14104)
Vulnerability from cvelistv5 – Published: 2025-12-05 16:22 – Updated: 2026-02-17 09:27
VLAI?
EPSS
Title
Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames
Summary
A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.
Severity ?
6.1 (Medium)
CWE
- CWE-125 - Out-of-bounds Read
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| util-linux | util-linux |
Affected:
0 , < 2.41.3
(semver)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-14104",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-05T20:03:09.994553Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-05T20:03:19.733Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://github.com/util-linux/util-linux",
"defaultStatus": "unaffected",
"packageName": "util-linux",
"product": "util-linux",
"vendor": "util-linux",
"versions": [
{
"lessThan": "2.41.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10.1"
],
"defaultStatus": "affected",
"packageName": "util-linux",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.40.2-15.el10_1",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
],
"defaultStatus": "affected",
"packageName": "util-linux",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.32.1-48.el8_10",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
],
"defaultStatus": "affected",
"packageName": "util-linux",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.32.1-48.el8_10",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/a:redhat:enterprise_linux:9::appstream"
],
"defaultStatus": "affected",
"packageName": "util-linux",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.37.4-21.el9_7",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/a:redhat:enterprise_linux:9::appstream"
],
"defaultStatus": "affected",
"packageName": "util-linux",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.37.4-21.el9_7",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:ceph_storage:7::el9"
],
"defaultStatus": "affected",
"packageName": "rhceph/rhceph-7-rhel9",
"product": "Red Hat Ceph Storage 7",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:ceph_storage:8::el9"
],
"defaultStatus": "affected",
"packageName": "rhceph/rhceph-8-rhel9",
"product": "Red Hat Ceph Storage 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:insights_proxy:1.5::el9"
],
"defaultStatus": "affected",
"packageName": "insights-proxy/insights-proxy-container-rhel9",
"product": "Red Hat Insights proxy 1.5",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:rhui:5::el9"
],
"defaultStatus": "affected",
"packageName": "rhui5/installer-rhel9",
"product": "Red Hat Update Infrastructure 5",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "affected",
"packageName": "util-linux-ng",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7"
],
"defaultStatus": "affected",
"packageName": "util-linux",
"product": "Red Hat Enterprise Linux 7",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4"
],
"defaultStatus": "affected",
"packageName": "rhcos",
"product": "Red Hat OpenShift Container Platform 4",
"vendor": "Red Hat"
}
],
"datePublic": "2025-12-05T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Moderate"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-17T09:27:00.779Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2026:1696",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1696"
},
{
"name": "RHSA-2026:1852",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1852"
},
{
"name": "RHSA-2026:1913",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1913"
},
{
"name": "RHSA-2026:2485",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"name": "RHSA-2026:2563",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"name": "RHSA-2026:2737",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"name": "RHSA-2026:2800",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:2800"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"name": "RHBZ#2419369",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-12-05T14:16:36.004Z",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2025-12-05T00:00:00.000Z",
"value": "Made public."
}
],
"title": "Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames",
"workarounds": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability."
}
],
"x_generator": {
"engine": "cvelib 1.8.0"
},
"x_redhatCweChain": "CWE-125: Out-of-bounds Read"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2025-14104",
"datePublished": "2025-12-05T16:22:09.283Z",
"dateReserved": "2025-12-05T14:18:15.840Z",
"dateUpdated": "2026-02-17T09:27:00.779Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-14104\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2025-12-05T17:16:03.117\",\"lastModified\":\"2026-02-17T10:15:57.080\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":4.2}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2026:1696\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:1852\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:1913\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:2485\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:2563\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:2737\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:2800\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2025-14104\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2419369\",\"source\":\"secalert@redhat.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-14104\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-12-05T20:03:09.994553Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-05T20:03:16.006Z\"}}], \"cna\": {\"title\": \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\", \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Moderate\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.1, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"util-linux\", \"product\": \"util-linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"2.41.3\", \"versionType\": \"semver\"}], \"packageName\": \"util-linux\", \"collectionURL\": \"https://github.com/util-linux/util-linux\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10.1\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.40.2-15.el10_1\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"util-linux\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::appstream\", \"cpe:/a:redhat:enterprise_linux:8::crb\", \"cpe:/o:redhat:enterprise_linux:8::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.32.1-48.el8_10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"util-linux\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::appstream\", \"cpe:/a:redhat:enterprise_linux:8::crb\", \"cpe:/o:redhat:enterprise_linux:8::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.32.1-48.el8_10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"util-linux\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::crb\", \"cpe:/o:redhat:enterprise_linux:9::baseos\", \"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.37.4-21.el9_7\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"util-linux\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::crb\", \"cpe:/o:redhat:enterprise_linux:9::baseos\", \"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.37.4-21.el9_7\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"util-linux\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:ceph_storage:7::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Ceph Storage 7\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhceph/rhceph-7-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:ceph_storage:8::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Ceph Storage 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhceph/rhceph-8-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:insights_proxy:1.5::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Insights proxy 1.5\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"insights-proxy/insights-proxy-container-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhui:5::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Update Infrastructure 5\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhui5/installer-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"util-linux-ng\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"packageName\": \"util-linux\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4\", \"packageName\": \"rhcos\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-12-05T14:16:36.004Z\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2025-12-05T00:00:00.000Z\", \"value\": \"Made public.\"}], \"datePublic\": \"2025-12-05T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2026:1696\", \"name\": \"RHSA-2026:1696\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:1852\", \"name\": \"RHSA-2026:1852\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:1913\", \"name\": \"RHSA-2026:1913\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:2485\", \"name\": \"RHSA-2026:2485\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:2563\", \"name\": \"RHSA-2026:2563\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:2737\", \"name\": \"RHSA-2026:2737\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:2800\", \"name\": \"RHSA-2026:2800\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2025-14104\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2419369\", \"name\": \"RHBZ#2419369\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.\"}], \"x_generator\": {\"engine\": \"cvelib 1.8.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-125\", \"description\": \"Out-of-bounds Read\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2026-02-17T09:27:00.779Z\"}, \"x_redhatCweChain\": \"CWE-125: Out-of-bounds Read\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-14104\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-17T09:27:00.779Z\", \"dateReserved\": \"2025-12-05T14:18:15.840Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2025-12-05T16:22:09.283Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:2800
Vulnerability from csaf_redhat - Published: 2026-02-17 09:23 - Updated: 2026-02-18 17:56Summary
Red Hat Security Advisory: Red Hat Ceph Storage
Notes
Topic
A new version of Red Hat build of Ceph Storage has been released
Details
The Red Hat Storage Ceph container images are based on the latest ubi9 base image and Ceph 7.1.
This release updates to the latest version.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A new version of Red Hat build of Ceph Storage has been released",
"title": "Topic"
},
{
"category": "general",
"text": "The Red Hat Storage Ceph container images are based on the latest ubi9 base image and Ceph 7.1.\nThis release updates to the latest version.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2800",
"url": "https://access.redhat.com/errata/RHSA-2026:2800"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-31884",
"url": "https://access.redhat.com/security/cve/CVE-2024-31884"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14104",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6176",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-7783",
"url": "https://access.redhat.com/security/cve/CVE-2025-7783"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/",
"url": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2800.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Ceph Storage",
"tracking": {
"current_release_date": "2026-02-18T17:56:07+00:00",
"generator": {
"date": "2026-02-18T17:56:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2800",
"initial_release_date": "2026-02-17T09:23:04+00:00",
"revision_history": [
{
"date": "2026-02-17T09:23:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-17T09:23:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-18T17:56:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ceph Storage 7",
"product": {
"name": "Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ceph_storage:7::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ceph Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770708805"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770649398"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3Ac3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770650099"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3Acffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770649294"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-7-rhel9@sha256%3A485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632724"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770642181"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770708805"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3Ad7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770708805"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770649398"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770650099"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3A329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770649294"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-7-rhel9@sha256%3Ac22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632724"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3Ae14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770642181"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770708805"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770649398"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770650099"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3Aa57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770649294"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-7-rhel9@sha256%3Adf2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632724"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770642181"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Martin Schobert"
]
}
],
"cve": "CVE-2024-31884",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2025-08-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2389907"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pybind: Improper use of Pybind",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-31884"
},
{
"category": "external",
"summary": "RHBZ#2389907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2389907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31884"
}
],
"release_date": "2026-01-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T09:23:04+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2800"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pybind: Improper use of Pybind"
},
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T09:23:04+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2800"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
},
{
"cve": "CVE-2025-7783",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"discovery_date": "2025-07-18T17:00:43.396637+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2381959"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability related to predictable random number generation has been discovered in the form-data JavaScript library. The library utilizes Math.random() to determine boundary values for multipart form-encoded data.\n\nThis presents a security risk if an attacker can observe other values generated by Math.random() within the target application and simultaneously control at least one field of a request made using form-data. Under these conditions, the attacker could potentially predict or determine the boundary values. This predictability could be leveraged to bypass security controls, manipulate form data, or potentially lead to data integrity issues or other forms of exploitation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "form-data: Unsafe random function in form-data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect host systems. The impact of this vulnerability is limited to specific applications which integrate the `form-data` library. As a result the impact of this CVE is limited on RedHat systems.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-7783"
},
{
"category": "external",
"summary": "RHBZ#2381959",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2381959"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-7783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7783"
},
{
"category": "external",
"summary": "https://github.com/form-data/form-data/commit/3d1723080e6577a66f17f163ecd345a21d8d0fd0",
"url": "https://github.com/form-data/form-data/commit/3d1723080e6577a66f17f163ecd345a21d8d0fd0"
},
{
"category": "external",
"summary": "https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4",
"url": "https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4"
}
],
"release_date": "2025-07-18T16:34:44.889000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T09:23:04+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2800"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "form-data: Unsafe random function in form-data"
},
{
"cve": "CVE-2025-14104",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-12-05T14:16:36.004000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419369"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "RHBZ#2419369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104"
}
],
"release_date": "2025-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T09:23:04+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2800"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T09:23:04+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2800"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T09:23:04+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2800"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
}
]
}
RHSA-2026:2485
Vulnerability from csaf_redhat - Published: 2026-02-10 20:29 - Updated: 2026-02-17 19:45Summary
Red Hat Security Advisory: Insights proxy Container Image
Notes
Topic
Initial GA Release of Red Hat Insights proxy
Details
The Insights proxy Container is used by the Insights proxy product RPM
and serves as an intermediary between cystomer systems in disconnected networks,
air-gapped systems or systems with no outside connections and Insights.
The Insights proxy routes all Red Hat Insights traffic through itself, providing
a layer of privary and security for disconnected customer systems.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Initial GA Release of Red Hat Insights proxy",
"title": "Topic"
},
{
"category": "general",
"text": "The Insights proxy Container is used by the Insights proxy product RPM\nand serves as an intermediary between cystomer systems in disconnected networks,\nair-gapped systems or systems with no outside connections and Insights.\n\nThe Insights proxy routes all Red Hat Insights traffic through itself, providing\na layer of privary and security for disconnected customer systems.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2485",
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-11187",
"url": "https://access.redhat.com/security/cve/CVE-2025-11187"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13601",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14104",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15467",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15468",
"url": "https://access.redhat.com/security/cve/CVE-2025-15468"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15469",
"url": "https://access.redhat.com/security/cve/CVE-2025-15469"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66199",
"url": "https://access.redhat.com/security/cve/CVE-2025-66199"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68160",
"url": "https://access.redhat.com/security/cve/CVE-2025-68160"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68973",
"url": "https://access.redhat.com/security/cve/CVE-2025-68973"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69418",
"url": "https://access.redhat.com/security/cve/CVE-2025-69418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69419",
"url": "https://access.redhat.com/security/cve/CVE-2025-69419"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69420",
"url": "https://access.redhat.com/security/cve/CVE-2025-69420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69421",
"url": "https://access.redhat.com/security/cve/CVE-2025-69421"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9086",
"url": "https://access.redhat.com/security/cve/CVE-2025-9086"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22795",
"url": "https://access.redhat.com/security/cve/CVE-2026-22795"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22796",
"url": "https://access.redhat.com/security/cve/CVE-2026-22796"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2485.json"
}
],
"title": "Red Hat Security Advisory: Insights proxy Container Image",
"tracking": {
"current_release_date": "2026-02-17T19:45:00+00:00",
"generator": {
"date": "2026-02-17T19:45:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2485",
"initial_release_date": "2026-02-10T20:29:13+00:00",
"revision_history": [
{
"date": "2026-02-10T20:29:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-10T20:29:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-17T19:45:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Insights proxy 1.5",
"product": {
"name": "Red Hat Insights proxy 1.5",
"product_id": "Red Hat Insights proxy 1.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:insights_proxy:1.5::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Insights proxy"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64",
"product": {
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64",
"product_id": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64",
"product_identification_helper": {
"purl": "pkg:oci/insights-proxy-container-rhel9@sha256%3Aab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016?arch=amd64\u0026repository_url=registry.redhat.io/insights-proxy\u0026tag=1770740405"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"product": {
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"product_id": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/insights-proxy-container-rhel9@sha256%3A975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc?arch=arm64\u0026repository_url=registry.redhat.io/insights-proxy\u0026tag=1770740405"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64 as a component of Red Hat Insights proxy 1.5",
"product_id": "Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64"
},
"product_reference": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"relates_to_product_reference": "Red Hat Insights proxy 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64 as a component of Red Hat Insights proxy 1.5",
"product_id": "Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
},
"product_reference": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64",
"relates_to_product_reference": "Red Hat Insights proxy 1.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-9086",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-09-12T06:01:02.244669+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394750"
}
],
"notes": [
{
"category": "description",
"text": "1. A cookie is set using the `secure` keyword for `https://target` \n 2. curl is redirected to or otherwise made to speak with `http://target` (same \n hostname, but using clear text HTTP) using the same cookie set \n 3. The same cookie name is set - but with just a slash as path (`path=\\\"/\\\",`).\n Since this site is not secure, the cookie *should* just be ignored.\n4. A bug in the path comparison logic makes curl read outside a heap buffer\n boundary\n\nThe bug either causes a crash or it potentially makes the comparison come to\nthe wrong conclusion and lets the clear-text site override the contents of the\nsecure cookie, contrary to expectations and depending on the memory contents\nimmediately following the single-byte allocation that holds the path.\n\nThe presumed and correct behavior would be to plainly ignore the second set of\nthe cookie since it was already set as secure on a secure host so overriding\nit on an insecure host should not be okay.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libcurl: Curl out of bounds read for cookie path",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9086"
},
{
"category": "external",
"summary": "RHBZ#2394750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-9086.html",
"url": "https://curl.se/docs/CVE-2025-9086.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-9086.json",
"url": "https://curl.se/docs/CVE-2025-9086.json"
},
{
"category": "external",
"summary": "https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6",
"url": "https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3294999",
"url": "https://hackerone.com/reports/3294999"
}
],
"release_date": "2025-09-12T05:10:03.815000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: libcurl: Curl out of bounds read for cookie path"
},
{
"cve": "CVE-2025-11187",
"cwe": {
"id": "CWE-233",
"name": "Improper Handling of Parameters"
},
"discovery_date": "2026-01-16T14:21:50.559000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430375"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat. It affects OpenSSL versions 3.6, 3.5, and 3.4, where improper validation of PBMAC1 parameters in PKCS#12 MAC verification can lead to a stack buffer overflow or NULL pointer dereference. Exploitation requires an application to process a maliciously crafted PKCS#12 file, which is uncommon as these files are typically trusted. OpenSSL versions 3.3, 3.0, 1.1.1, and 1.0.2 are not affected as they do not support PBMAC1 in PKCS#12.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-11187"
},
{
"category": "external",
"summary": "RHBZ#2430375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430375"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-11187",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11187"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "To mitigate this issue, avoid processing untrusted PKCS#12 files. Applications should only handle PKCS#12 files from trusted sources, as these files are typically used for storing private keys and are expected to be secure.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file"
},
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
},
{
"cve": "CVE-2025-14104",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-12-05T14:16:36.004000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419369"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "RHBZ#2419369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104"
}
],
"release_date": "2025-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames"
},
{
"cve": "CVE-2025-15467",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-01-16T14:21:50.710000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430376"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. On Red Hat Enterprise Linux, OpenSSL is built with stack protections enabled which mitigate the risk of code execution though a denial-of-service condition remains possible. This vulnerability only affects applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers, such as Kerberos using the PKINIT plugin. OpenSSL versions 1.1.1 and 1.0.2 are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "RHBZ#2430376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467"
}
],
"release_date": "2026-01-27T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing"
},
{
"cve": "CVE-2025-15468",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2026-01-16T14:21:51.062000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430377"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat. The NULL pointer dereference in the `SSL_CIPHER_find()` function, affecting OpenSSL versions 3.3, 3.4, 3.5, and 3.6, occurs only when applications utilizing the QUIC protocol uncommonly invoke this function from the `client_hello_cb` callback with an unknown cipher ID. This specific usage pattern and the resulting Denial of Service limit the overall impact in the Red Hat context.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15468"
},
{
"category": "external",
"summary": "RHBZ#2430377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430377"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15468",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15468"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling"
},
{
"cve": "CVE-2025-15469",
"cwe": {
"id": "CWE-1284",
"name": "Improper Validation of Specified Quantity in Input"
},
"discovery_date": "2026-01-16T14:21:51.411000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430378"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat. The flaw affects the `openssl dgst` command-line tool when used with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) on files larger than 16MB. Impact is limited as it requires both signing and verification to be performed using the affected command, and verifiers using library APIs are not impacted.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15469"
},
{
"category": "external",
"summary": "RHBZ#2430378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430378"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15469",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15469"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "To mitigate this issue, avoid using the `openssl dgst` command with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) for files larger than 16MB. Instead, utilize streaming digest algorithms with `openssl dgst` or use library APIs for signing and verification, as these are not affected by the truncation vulnerability. Users should ensure that input files for one-shot signing/verification with `openssl dgst` do not exceed 16MB.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation"
},
{
"cve": "CVE-2025-66199",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-16T14:21:51.739000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. The flaw in OpenSSL 3.3, 3.4, 3.5, and 3.6 allows an attacker to cause excessive memory allocation during TLS 1.3 handshake with certificate compression, potentially leading to a Denial of Service. This affects both clients and servers in mutual TLS scenarios where certificate compression is negotiated. Servers not requesting client certificates are not vulnerable to client-initiated attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66199"
},
{
"category": "external",
"summary": "RHBZ#2430379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66199",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66199"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "To mitigate this issue, disable the reception of compressed certificates by setting the SSL_OP_NO_RX_CERTIFICATE_COMPRESSION option in OpenSSL configurations. This will prevent the vulnerable code path from being exercised.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression"
},
{
"cve": "CVE-2025-68160",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2026-01-16T14:21:52.088000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430380"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat. The `BIO_f_linebuffer` filter, where this heap out-of-bounds write occurs, is not used by default in TLS/SSL data paths within Red Hat products. Exploitation requires third-party applications to explicitly use this filter with a BIO chain that can short-write and process large, newline-free data influenced by an attacker, which is an unlikely scenario under attacker control. Red Hat FIPS modules are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68160"
},
{
"category": "external",
"summary": "RHBZ#2430380",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430380"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68160",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68160"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter"
},
{
"cve": "CVE-2025-68973",
"cwe": {
"id": "CWE-675",
"name": "Multiple Operations on Resource in Single-Operation Context"
},
"discovery_date": "2025-12-28T17:00:44.161022+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425966"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in GnuPG\u0027s `armor_filter` function allows an attacker with local access to provide crafted input, potentially leading to information disclosure and arbitrary code execution due to an out-of-bounds write. Exploitation requires high attack complexity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68973"
},
{
"category": "external",
"summary": "RHBZ#2425966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425966"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68973",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68973"
},
{
"category": "external",
"summary": "https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306",
"url": "https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306"
},
{
"category": "external",
"summary": "https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9",
"url": "https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9"
},
{
"category": "external",
"summary": "https://gpg.fail/memcpy",
"url": "https://gpg.fail/memcpy"
},
{
"category": "external",
"summary": "https://news.ycombinator.com/item?id=46403200",
"url": "https://news.ycombinator.com/item?id=46403200"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/12/28/5",
"url": "https://www.openwall.com/lists/oss-security/2025/12/28/5"
}
],
"release_date": "2025-12-28T16:19:11.019000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid processing untrusted or unverified input with GnuPG. Exercise caution when handling GnuPG-encrypted or signed data from unknown or suspicious sources, as specially crafted input could trigger the vulnerability. This operational control reduces the attack surface by limiting exposure to malicious data.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write"
},
{
"cve": "CVE-2025-69418",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2026-01-16T14:21:52.438000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430381"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. In the Red Hat context, impact is limited because typical OpenSSL consumers using higher-level EVP APIs are not affected. The flaw only manifests when applications directly call low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in hardware-accelerated builds. Additionally, TLS does not use OCB ciphersuites, and FIPS modules are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69418"
},
{
"category": "external",
"summary": "RHBZ#2430381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69418"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls"
},
{
"cve": "CVE-2025-69419",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-01-16T14:21:52.793000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430386"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat. An out-of-bounds write in OpenSSL\u0027s PKCS12_get_friendlyname() function can lead to denial of service or arbitrary code execution. Exploitation requires an application to parse a specially crafted malicious PKCS#12 file. Red Hat FIPS modules are not affected as the PKCS#12 implementation is outside the FIPS module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69419"
},
{
"category": "external",
"summary": "RHBZ#2430386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69419",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69419"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, Red Hat recommends avoiding the processing of PKCS#12 files from untrusted or unverified sources. Applications that use the `PKCS12_get_friendlyname()` API should ensure that PKCS#12 files are only processed if they originate from trusted entities. Restricting the input sources for PKCS#12 files can significantly reduce the attack surface for this flaw.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing"
},
{
"cve": "CVE-2025-69420",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-01-16T14:21:53.497000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430388"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. A type confusion flaw in the TimeStamp Response verification code can lead to a Denial of Service when processing a specially crafted TimeStamp Response. Exploitation requires an application to call `TS_RESP_verify_response()` with a malformed response, and the TimeStamp protocol (RFC 3161) is not widely used. Red Hat FIPS modules are not affected as the TimeStamp Response implementation is outside the FIPS module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69420"
},
{
"category": "external",
"summary": "RHBZ#2430388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69420"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response"
},
{
"cve": "CVE-2025-69421",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2026-01-16T14:21:53.845000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430387"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat because it requires an application to process a specially crafted, malformed PKCS#12 file, leading to a Denial of Service. The vulnerability is limited to a crash and cannot be escalated to achieve code execution or memory disclosure. Red Hat FIPS modules are not affected as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69421"
},
{
"category": "external",
"summary": "RHBZ#2430387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69421",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69421"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing"
},
{
"cve": "CVE-2026-22795",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-01-16T14:21:53.146000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430389"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. An application processing a maliciously crafted PKCS#12 file can be caused to dereference an invalid or NULL pointer, resulting in a Denial of Service. In the Red Hat context, impact is limited as PKCS#12 files are typically used for trusted private keys and are not commonly accepted from untrusted sources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22795"
},
{
"category": "external",
"summary": "RHBZ#2430389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22795",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22795"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing"
},
{
"cve": "CVE-2026-22796",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"discovery_date": "2026-01-16T14:43:21.598000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430390"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. A type confusion flaw in the legacy PKCS#7 API can lead to a Denial of Service when processing specially crafted PKCS#7 data. Exploitation requires an application to perform signature verification of malformed PKCS#7 data. Red Hat products utilizing the FIPS module are not affected as the PKCS#7 parsing is outside the module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22796"
},
{
"category": "external",
"summary": "RHBZ#2430390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430390"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22796"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification"
}
]
}
RHSA-2026:2737
Vulnerability from csaf_redhat - Published: 2026-02-16 12:56 - Updated: 2026-02-18 17:56Summary
Red Hat Security Advisory: Red Hat Ceph Storage
Notes
Topic
A new version of Red Hat build of Ceph Storage has been released
Details
The Red Hat Storage Ceph container images are based on the latest ubi9 base image and Ceph 8.1.
This release updates to the latest version.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A new version of Red Hat build of Ceph Storage has been released",
"title": "Topic"
},
{
"category": "general",
"text": "The Red Hat Storage Ceph container images are based on the latest ubi9 base image and Ceph 8.1.\nThis release updates to the latest version.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2737",
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2019-10790",
"url": "https://access.redhat.com/security/cve/CVE-2019-10790"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-23358",
"url": "https://access.redhat.com/security/cve/CVE-2021-23358"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2022-34749",
"url": "https://access.redhat.com/security/cve/CVE-2022-34749"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-31884",
"url": "https://access.redhat.com/security/cve/CVE-2024-31884"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-51744",
"url": "https://access.redhat.com/security/cve/CVE-2024-51744"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-55565",
"url": "https://access.redhat.com/security/cve/CVE-2024-55565"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12816",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14104",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-26791",
"url": "https://access.redhat.com/security/cve/CVE-2025-26791"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47907",
"url": "https://access.redhat.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58183",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6176",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66031",
"url": "https://access.redhat.com/security/cve/CVE-2025-66031"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68429",
"url": "https://access.redhat.com/security/cve/CVE-2025-68429"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-7783",
"url": "https://access.redhat.com/security/cve/CVE-2025-7783"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/",
"url": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2737.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Ceph Storage",
"tracking": {
"current_release_date": "2026-02-18T17:56:04+00:00",
"generator": {
"date": "2026-02-18T17:56:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2737",
"initial_release_date": "2026-02-16T12:56:05+00:00",
"revision_history": [
{
"date": "2026-02-16T12:56:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-16T12:56:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-18T17:56:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ceph Storage 8",
"product": {
"name": "Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ceph_storage:8::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ceph Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3Ab219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770630607"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770631713"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3Af00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632172"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3A224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770631941"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3Abf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770630907"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632233"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770630607"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3Ae856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770631713"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632172"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3Afe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770631941"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3A2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770630907"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3Af31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632233"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770630607"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3Aedb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770631713"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3Aad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632172"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3A91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770631941"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3Ac571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770630907"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632233"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3Aeca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770630607"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770631713"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632172"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3Ad287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770631941"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3Aecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770630907"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3Ad19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632233"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-10790",
"discovery_date": "2025-08-20T22:37:38.151000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2389970"
}
],
"notes": [
{
"category": "description",
"text": "taffydb npm module, vulnerable in all versions up to and including 2.7.3, allows attackers to forge adding additional properties into user-input processed by taffy which can allow access to any data items in the DB. taffy sets an internal index for each data item in its DB. However, it is found that the internal index can be forged by adding additional properties into user-input. If index is found in the query, taffyDB will ignore other query conditions and directly return the indexed data item. Moreover, the internal index is in an easily-guessable format (e.g., T000002R000001). As such, attackers can use this vulnerability to access any data items in the DB.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "taffy: taffydb: Internal Property Tampering",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10790"
},
{
"category": "external",
"summary": "RHBZ#2389970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2389970"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10790",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10790"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10790",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10790"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-TAFFYDB-2992450",
"url": "https://security.snyk.io/vuln/SNYK-JS-TAFFYDB-2992450"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-TAFFY-546521",
"url": "https://snyk.io/vuln/SNYK-JS-TAFFY-546521"
},
{
"category": "external",
"summary": "https://www.usenix.org/system/files/sec21-xiao.pdf",
"url": "https://www.usenix.org/system/files/sec21-xiao.pdf"
}
],
"release_date": "2020-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "taffy: taffydb: Internal Property Tampering"
},
{
"cve": "CVE-2021-23358",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944286"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs-underscore. Arbitrary code execution via the template function is possible, particularly when a variable property is passed as an argument as it is not sanitized. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-underscore: Arbitrary code execution via the template function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Whilst the OpenShift Container Platform (OCP) openshift4/ose-grafana and openshift3/grafana as well as console, grc-ui and search-ui containers for Red Hat Advanced Management for Kubernetes (RHACM) include the vulnerable underscore library, the access to it is protected by OpenShift OAuth. Additionally this library is used in openshift4/ose-grafana container only in Grafana End-to-End Test package. Therefore the impact by this flaw is reduced to Low and the affected OCP components are marked as \"will not fix\" at this time and to Moderate for the affected RHACM components. This might be fixed in a future release.\n\nRed Hat Enterprise Virtualization includes the vulnerable underscore library, however it is not parsing any untrusted data, therefore impact is reduced to Low.\n\nBelow Red Hat products include the underscore dependency, but it is not used by the product and hence this issue has been rated as having a security impact of Low.\n\n* Red Hat Quay\n* Red Hat Gluster Storage 3\n* Red Hat OpenShift Container Storage 4\n* Red Hat Ceph Storage 3 and 4",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23358"
},
{
"category": "external",
"summary": "RHBZ#1944286",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944286"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23358",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23358"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23358",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23358"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs-underscore: Arbitrary code execution via the template function"
},
{
"cve": "CVE-2022-34749",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2022-07-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2112230"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDoS) flaw was found in the asteris emphasis regular expression implementation in Mistune. By sending specially-crafted regex input, a remote attacker could invoke a catastrophic backtrack, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mistune: catastrophic backtracking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-34749"
},
{
"category": "external",
"summary": "RHBZ#2112230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112230"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-34749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34749"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34749",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34749"
},
{
"category": "external",
"summary": "https://github.com/lepture/mistune/commit/a6d43215132fe4f3d93f8d7e90ba83b16a0838b2",
"url": "https://github.com/lepture/mistune/commit/a6d43215132fe4f3d93f8d7e90ba83b16a0838b2"
}
],
"release_date": "2022-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mistune: catastrophic backtracking"
},
{
"acknowledgments": [
{
"names": [
"Martin Schobert"
]
}
],
"cve": "CVE-2024-31884",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2025-08-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2389907"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pybind: Improper use of Pybind",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-31884"
},
{
"category": "external",
"summary": "RHBZ#2389907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2389907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31884"
}
],
"release_date": "2026-01-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pybind: Improper use of Pybind"
},
{
"cve": "CVE-2024-51744",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"discovery_date": "2024-11-04T22:01:08.655905+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323735"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang-jwt package. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they can miss the embedded `jwt.ErrTokenSignatureInvalid`, and thus, potentially accept invalid tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-51744"
},
{
"category": "external",
"summary": "RHBZ#2323735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-51744",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-51744"
},
{
"category": "external",
"summary": "https://github.com/golang-jwt/jwt/commit/7b1c1c00a171c6c79bbdb40e4ce7d197060c1c2c",
"url": "https://github.com/golang-jwt/jwt/commit/7b1c1c00a171c6c79bbdb40e4ce7d197060c1c2c"
},
{
"category": "external",
"summary": "https://github.com/golang-jwt/jwt/security/advisories/GHSA-29wx-vh33-7x7r",
"url": "https://github.com/golang-jwt/jwt/security/advisories/GHSA-29wx-vh33-7x7r"
}
],
"release_date": "2024-11-04T21:47:12.170000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt"
},
{
"cve": "CVE-2024-55565",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2024-12-09T02:00:45.255738+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331063"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nanoid. Affected versions of nanoid mishandles non-integer values. When nanoid is called with a fractional value, there were a number of undesirable effects:\n\n- In browser and non-secure, the code infinite loops on while (size--)\n- In node, the value of poolOffset becomes fractional, causing calls to nanoid to return zeroes until the pool is next filled: when i is initialized to poolOffset, pool[i] \u0026 63 -\u003e undefined \u0026 63 -\u003e 0\n- If the first call in node is a fractional argument, the initial buffer allocation fails with an error\n\nThe highest impact of this issue system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nanoid: nanoid mishandles non-integer values",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-55565"
},
{
"category": "external",
"summary": "RHBZ#2331063",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331063"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-55565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55565"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-55565",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-55565"
},
{
"category": "external",
"summary": "https://github.com/ai/nanoid/compare/3.3.7...3.3.8",
"url": "https://github.com/ai/nanoid/compare/3.3.7...3.3.8"
},
{
"category": "external",
"summary": "https://github.com/ai/nanoid/pull/510",
"url": "https://github.com/ai/nanoid/pull/510"
},
{
"category": "external",
"summary": "https://github.com/ai/nanoid/releases/tag/5.0.9",
"url": "https://github.com/ai/nanoid/releases/tag/5.0.9"
}
],
"release_date": "2024-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nanoid: nanoid mishandles non-integer values"
},
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
},
{
"cve": "CVE-2025-7783",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"discovery_date": "2025-07-18T17:00:43.396637+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2381959"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability related to predictable random number generation has been discovered in the form-data JavaScript library. The library utilizes Math.random() to determine boundary values for multipart form-encoded data.\n\nThis presents a security risk if an attacker can observe other values generated by Math.random() within the target application and simultaneously control at least one field of a request made using form-data. Under these conditions, the attacker could potentially predict or determine the boundary values. This predictability could be leveraged to bypass security controls, manipulate form data, or potentially lead to data integrity issues or other forms of exploitation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "form-data: Unsafe random function in form-data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect host systems. The impact of this vulnerability is limited to specific applications which integrate the `form-data` library. As a result the impact of this CVE is limited on RedHat systems.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-7783"
},
{
"category": "external",
"summary": "RHBZ#2381959",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2381959"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-7783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7783"
},
{
"category": "external",
"summary": "https://github.com/form-data/form-data/commit/3d1723080e6577a66f17f163ecd345a21d8d0fd0",
"url": "https://github.com/form-data/form-data/commit/3d1723080e6577a66f17f163ecd345a21d8d0fd0"
},
{
"category": "external",
"summary": "https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4",
"url": "https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4"
}
],
"release_date": "2025-07-18T16:34:44.889000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "form-data: Unsafe random function in form-data"
},
{
"cve": "CVE-2025-12816",
"cwe": {
"id": "CWE-179",
"name": "Incorrect Behavior Order: Early Validation"
},
"discovery_date": "2025-11-25T20:01:05.875196+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417097"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in node-forge. This vulnerability allows unauthenticated attackers to bypass downstream cryptographic verifications and security decisions via crafting ASN.1 (Abstract Syntax Notation One) structures to desynchronize schema validations, yielding a semantic divergence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products due to an interpretation conflict in the node-forge library. An unauthenticated attacker could exploit this flaw by crafting malicious ASN.1 structures, leading to a bypass of cryptographic verifications and security decisions in affected applications. This impacts various Red Hat products that utilize node-forge for cryptographic operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "RHBZ#2417097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417097"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge",
"url": "https://github.com/digitalbazaar/forge"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/pull/1124",
"url": "https://github.com/digitalbazaar/forge/pull/1124"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/521113",
"url": "https://kb.cert.org/vuls/id/521113"
},
{
"category": "external",
"summary": "https://www.npmjs.com/package/node-forge",
"url": "https://www.npmjs.com/package/node-forge"
}
],
"release_date": "2025-11-25T19:15:50.243000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications"
},
{
"cve": "CVE-2025-14104",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-12-05T14:16:36.004000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419369"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "RHBZ#2419369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104"
}
],
"release_date": "2025-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames"
},
{
"cve": "CVE-2025-26791",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2025-02-14T09:00:45.578144+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2345695"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in DOMPurify. This vulnerability allows attackers to execute mutation-based Cross-site scripting (mXSS) via an incorrect template literal regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dompurify: Mutation XSS in DOMPurify Due to Improper Template Literal Handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-26791"
},
{
"category": "external",
"summary": "RHBZ#2345695",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345695"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-26791",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-26791"
},
{
"category": "external",
"summary": "https://ensy.zip/posts/dompurify-323-bypass/",
"url": "https://ensy.zip/posts/dompurify-323-bypass/"
},
{
"category": "external",
"summary": "https://github.com/cure53/DOMPurify/commit/d18ffcb554e0001748865da03ac75dd7829f0f02",
"url": "https://github.com/cure53/DOMPurify/commit/d18ffcb554e0001748865da03ac75dd7829f0f02"
},
{
"category": "external",
"summary": "https://github.com/cure53/DOMPurify/releases/tag/3.2.4",
"url": "https://github.com/cure53/DOMPurify/releases/tag/3.2.4"
},
{
"category": "external",
"summary": "https://nsysean.github.io/posts/dompurify-323-bypass/",
"url": "https://nsysean.github.io/posts/dompurify-323-bypass/"
}
],
"release_date": "2025-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dompurify: Mutation XSS in DOMPurify Due to Improper Template Literal Handling"
},
{
"cve": "CVE-2025-47907",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2025-08-07T16:01:06.247481+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2387083"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in database/sql. Concurrent queries can produce unexpected results when a query is cancelled during a Scan method call on returned Rows, creating a race condition. This vulnerability allows an attacker who can initiate and cancel queries to trigger this condition, possibly leading to inconsistent data being returned to the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "database/sql: Postgres Scan Race Condition",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability marked as Moderate severity issues rather than Important. The os/exec LookPath flaw requires a misconfigured PATH to be exploitable, and the database/sql race condition primarily impacts applications that cancel queries while running multiple queries concurrently. Both can cause unexpected behavior, but the exploitation scope is limited and unlikely to result in direct compromise in most typical deployments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "RHBZ#2387083",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387083"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907"
},
{
"category": "external",
"summary": "https://go.dev/cl/693735",
"url": "https://go.dev/cl/693735"
},
{
"category": "external",
"summary": "https://go.dev/issue/74831",
"url": "https://go.dev/issue/74831"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x5MKroML2yM",
"url": "https://groups.google.com/g/golang-announce/c/x5MKroML2yM"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-3849",
"url": "https://pkg.go.dev/vuln/GO-2025-3849"
}
],
"release_date": "2025-08-07T15:25:30.704000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "database/sql: Postgres Scan Race Condition"
},
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-58183",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-29T23:01:50.573951+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2407258"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to be able to process a specially crafted GNU tar pax 1.0 archive with the application using the archive/tar package. Additionally, this issue can cause the Go application to allocate a large amount of memory, eventually leading to an out-of-memory condition and resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "RHBZ#2407258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2407258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://go.dev/cl/709861",
"url": "https://go.dev/cl/709861"
},
{
"category": "external",
"summary": "https://go.dev/issue/75677",
"url": "https://go.dev/issue/75677"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI",
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4014",
"url": "https://pkg.go.dev/vuln/GO-2025-4014"
}
],
"release_date": "2025-10-29T22:10:14.376000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map"
},
{
"cve": "CVE-2025-66031",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-11-26T23:01:36.363253+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417397"
}
],
"notes": [
{
"category": "description",
"text": "Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge ASN.1 Unbounded Recursion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66031"
},
{
"category": "external",
"summary": "RHBZ#2417397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66031"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66031",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66031"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/commit/260425c6167a38aae038697132483b5517b26451",
"url": "https://github.com/digitalbazaar/forge/commit/260425c6167a38aae038697132483b5517b26451"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-554w-wpv2-vw27",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-554w-wpv2-vw27"
}
],
"release_date": "2025-11-26T22:23:26.013000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "node-forge: node-forge ASN.1 Unbounded Recursion"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-68429",
"cwe": {
"id": "CWE-538",
"name": "Insertion of Sensitive Information into Externally-Accessible File or Directory"
},
"discovery_date": "2025-12-17T23:03:29.948214+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423460"
}
],
"notes": [
{
"category": "description",
"text": "Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook\u2019s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle\u2019s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook\u2014on both their local machines and CI environment\u2014to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook\u2019s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Storybook: Storybook: Information disclosure via unexpected bundling of environment variables",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat as it can lead to the unintended exposure of sensitive environment variables. This occurs when a Storybook project is built using the `storybook build` command in a directory containing a `.env` file, and the resulting bundle is subsequently published to a web-accessible location. Storybook instances built without `.env` files or run in development mode (`storybook dev`) are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68429"
},
{
"category": "external",
"summary": "RHBZ#2423460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68429"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68429",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68429"
},
{
"category": "external",
"summary": "https://github.com/storybookjs/storybook/security/advisories/GHSA-8452-54wp-rmv6",
"url": "https://github.com/storybookjs/storybook/security/advisories/GHSA-8452-54wp-rmv6"
},
{
"category": "external",
"summary": "https://storybook.js.org/blog/security-advisory",
"url": "https://storybook.js.org/blog/security-advisory"
}
],
"release_date": "2025-12-17T22:26:55.732000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Storybook: Storybook: Information disclosure via unexpected bundling of environment variables"
}
]
}
RHSA-2026:1913
Vulnerability from csaf_redhat - Published: 2026-02-04 20:08 - Updated: 2026-02-17 09:27Summary
Red Hat Security Advisory: util-linux security update
Notes
Topic
An update for util-linux is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program.
Security Fix(es):
* util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames (CVE-2025-14104)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for util-linux is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program.\n\nSecurity Fix(es):\n\n* util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames (CVE-2025-14104)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1913",
"url": "https://access.redhat.com/errata/RHSA-2026:1913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2419369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1913.json"
}
],
"title": "Red Hat Security Advisory: util-linux security update",
"tracking": {
"current_release_date": "2026-02-17T09:27:47+00:00",
"generator": {
"date": "2026-02-17T09:27:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1913",
"initial_release_date": "2026-02-04T20:08:57+00:00",
"revision_history": [
{
"date": "2026-02-04T20:08:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-04T20:08:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-17T09:27:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"product_id": "libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-devel@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libmount-devel-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "libmount-devel-0:2.37.4-21.el9_7.aarch64",
"product_id": "libmount-devel-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-devel@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"product_id": "libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-devel@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "python3-libmount-0:2.37.4-21.el9_7.aarch64",
"product_id": "python3-libmount-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "uuidd-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "uuidd-0:2.37.4-21.el9_7.aarch64",
"product_id": "uuidd-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"product_id": "util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debugsource@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_id": "libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-debuginfo@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_id": "libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-debuginfo@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_id": "libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-debuginfo@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_id": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-debuginfo@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_id": "libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-debuginfo@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_id": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount-debuginfo@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_id": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-core-debuginfo@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_id": "util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debuginfo@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_id": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user-debuginfo@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_id": "uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd-debuginfo@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libblkid-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "libblkid-0:2.37.4-21.el9_7.aarch64",
"product_id": "libblkid-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "libfdisk-0:2.37.4-21.el9_7.aarch64",
"product_id": "libfdisk-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libmount-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "libmount-0:2.37.4-21.el9_7.aarch64",
"product_id": "libmount-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "libsmartcols-0:2.37.4-21.el9_7.aarch64",
"product_id": "libsmartcols-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libuuid-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "libuuid-0:2.37.4-21.el9_7.aarch64",
"product_id": "libuuid-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "util-linux-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "util-linux-0:2.37.4-21.el9_7.aarch64",
"product_id": "util-linux-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "util-linux-core-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "util-linux-core-0:2.37.4-21.el9_7.aarch64",
"product_id": "util-linux-core-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-core@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "util-linux-user-0:2.37.4-21.el9_7.aarch64",
"product_id": "util-linux-user-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"product_id": "libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-devel@2.37.4-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"product": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"product_id": "libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-devel@2.37.4-21.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"product_id": "libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-devel@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"product_id": "libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-devel@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"product_id": "libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-devel@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"product_id": "python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "uuidd-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "uuidd-0:2.37.4-21.el9_7.ppc64le",
"product_id": "uuidd-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"product_id": "util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debugsource@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_id": "libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-debuginfo@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_id": "libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-debuginfo@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_id": "libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-debuginfo@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_id": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-debuginfo@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_id": "libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-debuginfo@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_id": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount-debuginfo@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_id": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-core-debuginfo@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_id": "util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debuginfo@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_id": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user-debuginfo@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_id": "uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd-debuginfo@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libblkid-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "libblkid-0:2.37.4-21.el9_7.ppc64le",
"product_id": "libblkid-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libfdisk-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "libfdisk-0:2.37.4-21.el9_7.ppc64le",
"product_id": "libfdisk-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libmount-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "libmount-0:2.37.4-21.el9_7.ppc64le",
"product_id": "libmount-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"product_id": "libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libuuid-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "libuuid-0:2.37.4-21.el9_7.ppc64le",
"product_id": "libuuid-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "util-linux-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "util-linux-0:2.37.4-21.el9_7.ppc64le",
"product_id": "util-linux-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"product_id": "util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-core@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"product_id": "util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"product_id": "libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-devel@2.37.4-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"product": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"product_id": "libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-devel@2.37.4-21.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-0:2.37.4-21.el9_7.i686",
"product": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.i686",
"product_id": "libblkid-devel-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-devel@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libmount-devel-0:2.37.4-21.el9_7.i686",
"product": {
"name": "libmount-devel-0:2.37.4-21.el9_7.i686",
"product_id": "libmount-devel-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-devel@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libuuid-devel-0:2.37.4-21.el9_7.i686",
"product": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.i686",
"product_id": "libuuid-devel-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-devel@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"product": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"product_id": "util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debugsource@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"product": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"product_id": "libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-debuginfo@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"product": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"product_id": "libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-debuginfo@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"product": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"product_id": "libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-debuginfo@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"product": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"product_id": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-debuginfo@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"product": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"product_id": "libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-debuginfo@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"product": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"product_id": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount-debuginfo@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"product": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"product_id": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-core-debuginfo@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"product": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"product_id": "util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debuginfo@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"product": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"product_id": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user-debuginfo@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"product": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"product_id": "uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd-debuginfo@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libblkid-0:2.37.4-21.el9_7.i686",
"product": {
"name": "libblkid-0:2.37.4-21.el9_7.i686",
"product_id": "libblkid-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libfdisk-0:2.37.4-21.el9_7.i686",
"product": {
"name": "libfdisk-0:2.37.4-21.el9_7.i686",
"product_id": "libfdisk-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libmount-0:2.37.4-21.el9_7.i686",
"product": {
"name": "libmount-0:2.37.4-21.el9_7.i686",
"product_id": "libmount-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-0:2.37.4-21.el9_7.i686",
"product": {
"name": "libsmartcols-0:2.37.4-21.el9_7.i686",
"product_id": "libsmartcols-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libuuid-0:2.37.4-21.el9_7.i686",
"product": {
"name": "libuuid-0:2.37.4-21.el9_7.i686",
"product_id": "libuuid-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libfdisk-devel-0:2.37.4-21.el9_7.i686",
"product": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.i686",
"product_id": "libfdisk-devel-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-devel@2.37.4-21.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"product": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"product_id": "libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-devel@2.37.4-21.el9_7?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"product_id": "libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-devel@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libmount-devel-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "libmount-devel-0:2.37.4-21.el9_7.x86_64",
"product_id": "libmount-devel-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-devel@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"product_id": "libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-devel@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "python3-libmount-0:2.37.4-21.el9_7.x86_64",
"product_id": "python3-libmount-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "uuidd-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "uuidd-0:2.37.4-21.el9_7.x86_64",
"product_id": "uuidd-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"product_id": "util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debugsource@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_id": "libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-debuginfo@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_id": "libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-debuginfo@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_id": "libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-debuginfo@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_id": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-debuginfo@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_id": "libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-debuginfo@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_id": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount-debuginfo@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_id": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-core-debuginfo@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_id": "util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debuginfo@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_id": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user-debuginfo@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_id": "uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd-debuginfo@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libblkid-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "libblkid-0:2.37.4-21.el9_7.x86_64",
"product_id": "libblkid-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "libfdisk-0:2.37.4-21.el9_7.x86_64",
"product_id": "libfdisk-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libmount-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "libmount-0:2.37.4-21.el9_7.x86_64",
"product_id": "libmount-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "libsmartcols-0:2.37.4-21.el9_7.x86_64",
"product_id": "libsmartcols-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libuuid-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "libuuid-0:2.37.4-21.el9_7.x86_64",
"product_id": "libuuid-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "util-linux-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "util-linux-0:2.37.4-21.el9_7.x86_64",
"product_id": "util-linux-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "util-linux-core-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "util-linux-core-0:2.37.4-21.el9_7.x86_64",
"product_id": "util-linux-core-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-core@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "util-linux-user-0:2.37.4-21.el9_7.x86_64",
"product_id": "util-linux-user-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"product_id": "libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-devel@2.37.4-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"product": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"product_id": "libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-devel@2.37.4-21.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.s390x",
"product_id": "libblkid-devel-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-devel@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libmount-devel-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "libmount-devel-0:2.37.4-21.el9_7.s390x",
"product_id": "libmount-devel-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-devel@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libuuid-devel-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.s390x",
"product_id": "libuuid-devel-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-devel@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "python3-libmount-0:2.37.4-21.el9_7.s390x",
"product_id": "python3-libmount-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "uuidd-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "uuidd-0:2.37.4-21.el9_7.s390x",
"product_id": "uuidd-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"product_id": "util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debugsource@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_id": "libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-debuginfo@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_id": "libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-debuginfo@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_id": "libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-debuginfo@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_id": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-debuginfo@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_id": "libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-debuginfo@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_id": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount-debuginfo@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_id": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-core-debuginfo@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_id": "util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debuginfo@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_id": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user-debuginfo@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_id": "uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd-debuginfo@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libblkid-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "libblkid-0:2.37.4-21.el9_7.s390x",
"product_id": "libblkid-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libfdisk-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "libfdisk-0:2.37.4-21.el9_7.s390x",
"product_id": "libfdisk-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libmount-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "libmount-0:2.37.4-21.el9_7.s390x",
"product_id": "libmount-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "libsmartcols-0:2.37.4-21.el9_7.s390x",
"product_id": "libsmartcols-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libuuid-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "libuuid-0:2.37.4-21.el9_7.s390x",
"product_id": "libuuid-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "util-linux-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "util-linux-0:2.37.4-21.el9_7.s390x",
"product_id": "util-linux-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "util-linux-core-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "util-linux-core-0:2.37.4-21.el9_7.s390x",
"product_id": "util-linux-core-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-core@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "util-linux-user-0:2.37.4-21.el9_7.s390x",
"product_id": "util-linux-user-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"product_id": "libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-devel@2.37.4-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"product": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"product_id": "libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-devel@2.37.4-21.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "util-linux-0:2.37.4-21.el9_7.src",
"product": {
"name": "util-linux-0:2.37.4-21.el9_7.src",
"product_id": "util-linux-0:2.37.4-21.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux@2.37.4-21.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libblkid-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libblkid-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libblkid-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libblkid-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libblkid-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libblkid-devel-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libblkid-devel-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libfdisk-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libfdisk-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libfdisk-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libfdisk-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libfdisk-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libfdisk-devel-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libmount-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libmount-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libmount-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libmount-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libmount-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libmount-devel-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libmount-devel-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libmount-devel-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libmount-devel-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libsmartcols-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libsmartcols-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libsmartcols-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libsmartcols-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libuuid-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libuuid-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libuuid-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libuuid-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libuuid-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libuuid-devel-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libuuid-devel-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "python3-libmount-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "python3-libmount-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "python3-libmount-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.37.4-21.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.src"
},
"product_reference": "util-linux-0:2.37.4-21.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-core-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-core-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-core-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.i686"
},
"product_reference": "util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-user-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-user-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-user-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "uuidd-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "uuidd-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "uuidd-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "uuidd-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libblkid-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libblkid-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libblkid-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libblkid-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libblkid-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libblkid-devel-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libblkid-devel-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libfdisk-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libfdisk-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libfdisk-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libfdisk-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libfdisk-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libfdisk-devel-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libmount-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libmount-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libmount-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libmount-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libmount-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libmount-devel-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libmount-devel-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libmount-devel-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libmount-devel-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libsmartcols-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libsmartcols-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libsmartcols-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libsmartcols-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libuuid-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libuuid-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libuuid-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libuuid-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libuuid-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libuuid-devel-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libuuid-devel-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "python3-libmount-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "python3-libmount-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "python3-libmount-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.37.4-21.el9_7.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.src"
},
"product_reference": "util-linux-0:2.37.4-21.el9_7.src",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-core-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-core-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-core-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.i686"
},
"product_reference": "util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-user-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-user-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-user-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "uuidd-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "uuidd-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "uuidd-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "uuidd-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libblkid-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libblkid-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libblkid-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libblkid-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libblkid-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libblkid-devel-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libblkid-devel-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libfdisk-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libfdisk-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libfdisk-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libfdisk-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libfdisk-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libfdisk-devel-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libmount-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libmount-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libmount-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libmount-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libmount-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libmount-devel-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libmount-devel-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libmount-devel-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libmount-devel-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libsmartcols-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libsmartcols-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libsmartcols-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libsmartcols-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libuuid-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libuuid-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libuuid-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libuuid-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libuuid-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.i686"
},
"product_reference": "libuuid-devel-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "libuuid-devel-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "python3-libmount-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "python3-libmount-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "python3-libmount-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.37.4-21.el9_7.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.src"
},
"product_reference": "util-linux-0:2.37.4-21.el9_7.src",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-core-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-core-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-core-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.i686"
},
"product_reference": "util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-user-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-user-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-user-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "uuidd-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "uuidd-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "uuidd-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "uuidd-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64"
},
"product_reference": "uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.i686"
},
"product_reference": "uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le"
},
"product_reference": "uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.s390x"
},
"product_reference": "uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64"
},
"product_reference": "uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14104",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-12-05T14:16:36.004000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419369"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.src",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.src",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.src",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "RHBZ#2419369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104"
}
],
"release_date": "2025-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T20:08:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.src",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.src",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.src",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1913"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.src",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.src",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.src",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.src",
"AppStream-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.src",
"BaseOS-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libblkid-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libblkid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libblkid-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libfdisk-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libfdisk-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libfdisk-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libmount-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libmount-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libsmartcols-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libsmartcols-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libsmartcols-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libuuid-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libuuid-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:libuuid-devel-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:python3-libmount-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:python3-libmount-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.src",
"CRB-9.7.0.Z.MAIN:util-linux-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-core-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-core-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-debugsource-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-user-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:util-linux-user-debuginfo-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:uuidd-0:2.37.4-21.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.i686",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:uuidd-debuginfo-0:2.37.4-21.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames"
}
]
}
RHSA-2026:2563
Vulnerability from csaf_redhat - Published: 2026-02-11 14:34 - Updated: 2026-02-18 17:55Summary
Red Hat Security Advisory: Red Hat Update Infrastructure 5 security update
Notes
Topic
The latest release of Red Hat Update Infrastructure. For more details, see the product documentation.
Details
Red Hat Update Infrastructure (RHUI) container images are based on the latest RHUI RPM packages and the ubi9 or ubi9-init base images.
This release updates to the latest version.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The latest release of Red Hat Update Infrastructure. For more details, see the product documentation.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Update Infrastructure (RHUI) container images are based on the latest RHUI RPM packages and the ubi9 or ubi9-init base images.\nThis release updates to the latest version.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2563",
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "external",
"summary": "https://access.redhat.com/products/red-hat-update-infrastructure",
"url": "https://access.redhat.com/products/red-hat-update-infrastructure"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-11187",
"url": "https://access.redhat.com/security/cve/CVE-2025-11187"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12084",
"url": "https://access.redhat.com/security/cve/CVE-2025-12084"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13601",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13836",
"url": "https://access.redhat.com/security/cve/CVE-2025-13836"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14104",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15467",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15468",
"url": "https://access.redhat.com/security/cve/CVE-2025-15468"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15469",
"url": "https://access.redhat.com/security/cve/CVE-2025-15469"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66199",
"url": "https://access.redhat.com/security/cve/CVE-2025-66199"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68160",
"url": "https://access.redhat.com/security/cve/CVE-2025-68160"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68973",
"url": "https://access.redhat.com/security/cve/CVE-2025-68973"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69418",
"url": "https://access.redhat.com/security/cve/CVE-2025-69418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69419",
"url": "https://access.redhat.com/security/cve/CVE-2025-69419"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69420",
"url": "https://access.redhat.com/security/cve/CVE-2025-69420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69421",
"url": "https://access.redhat.com/security/cve/CVE-2025-69421"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9086",
"url": "https://access.redhat.com/security/cve/CVE-2025-9086"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22795",
"url": "https://access.redhat.com/security/cve/CVE-2026-22795"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22796",
"url": "https://access.redhat.com/security/cve/CVE-2026-22796"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_update_infrastructure/5",
"url": "https://docs.redhat.com/en/documentation/red_hat_update_infrastructure/5"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2563.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Update Infrastructure 5 security update",
"tracking": {
"current_release_date": "2026-02-18T17:55:55+00:00",
"generator": {
"date": "2026-02-18T17:55:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2563",
"initial_release_date": "2026-02-11T14:34:45+00:00",
"revision_history": [
{
"date": "2026-02-11T14:34:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-11T14:34:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-18T17:55:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Update Infrastructure 5",
"product": {
"name": "Red Hat Update Infrastructure 5",
"product_id": "Red Hat Update Infrastructure 5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhui:5::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Update Infrastructure"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"product": {
"name": "registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"product_id": "registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cds-rhel9@sha256%3A83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe?arch=amd64\u0026repository_url=registry.redhat.io/rhui5\u0026tag=1770808689"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"product": {
"name": "registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"product_id": "registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/haproxy-rhel9@sha256%3A409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5?arch=amd64\u0026repository_url=registry.redhat.io/rhui5\u0026tag=1770807477"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"product": {
"name": "registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"product_id": "registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/installer-rhel9@sha256%3A48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f?arch=amd64\u0026repository_url=registry.redhat.io/rhui5\u0026tag=1770646925"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64",
"product": {
"name": "registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64",
"product_id": "registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhua-rhel9@sha256%3Adf709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8?arch=amd64\u0026repository_url=registry.redhat.io/rhui5\u0026tag=1770808765"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64 as a component of Red Hat Update Infrastructure 5",
"product_id": "Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64"
},
"product_reference": "registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"relates_to_product_reference": "Red Hat Update Infrastructure 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64 as a component of Red Hat Update Infrastructure 5",
"product_id": "Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64"
},
"product_reference": "registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"relates_to_product_reference": "Red Hat Update Infrastructure 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64 as a component of Red Hat Update Infrastructure 5",
"product_id": "Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
},
"product_reference": "registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"relates_to_product_reference": "Red Hat Update Infrastructure 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64 as a component of Red Hat Update Infrastructure 5",
"product_id": "Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
},
"product_reference": "registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64",
"relates_to_product_reference": "Red Hat Update Infrastructure 5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-9086",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-09-12T06:01:02.244669+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394750"
}
],
"notes": [
{
"category": "description",
"text": "1. A cookie is set using the `secure` keyword for `https://target` \n 2. curl is redirected to or otherwise made to speak with `http://target` (same \n hostname, but using clear text HTTP) using the same cookie set \n 3. The same cookie name is set - but with just a slash as path (`path=\\\"/\\\",`).\n Since this site is not secure, the cookie *should* just be ignored.\n4. A bug in the path comparison logic makes curl read outside a heap buffer\n boundary\n\nThe bug either causes a crash or it potentially makes the comparison come to\nthe wrong conclusion and lets the clear-text site override the contents of the\nsecure cookie, contrary to expectations and depending on the memory contents\nimmediately following the single-byte allocation that holds the path.\n\nThe presumed and correct behavior would be to plainly ignore the second set of\nthe cookie since it was already set as secure on a secure host so overriding\nit on an insecure host should not be okay.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libcurl: Curl out of bounds read for cookie path",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9086"
},
{
"category": "external",
"summary": "RHBZ#2394750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-9086.html",
"url": "https://curl.se/docs/CVE-2025-9086.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-9086.json",
"url": "https://curl.se/docs/CVE-2025-9086.json"
},
{
"category": "external",
"summary": "https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6",
"url": "https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3294999",
"url": "https://hackerone.com/reports/3294999"
}
],
"release_date": "2025-09-12T05:10:03.815000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: libcurl: Curl out of bounds read for cookie path"
},
{
"cve": "CVE-2025-11187",
"cwe": {
"id": "CWE-233",
"name": "Improper Handling of Parameters"
},
"discovery_date": "2026-01-16T14:21:50.559000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430375"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat. It affects OpenSSL versions 3.6, 3.5, and 3.4, where improper validation of PBMAC1 parameters in PKCS#12 MAC verification can lead to a stack buffer overflow or NULL pointer dereference. Exploitation requires an application to process a maliciously crafted PKCS#12 file, which is uncommon as these files are typically trusted. OpenSSL versions 3.3, 3.0, 1.1.1, and 1.0.2 are not affected as they do not support PBMAC1 in PKCS#12.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-11187"
},
{
"category": "external",
"summary": "RHBZ#2430375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430375"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-11187",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11187"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "To mitigate this issue, avoid processing untrusted PKCS#12 files. Applications should only handle PKCS#12 files from trusted sources, as these files are typically used for storing private keys and are expected to be secure.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file"
},
{
"cve": "CVE-2025-12084",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-03T19:01:03.489250+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418655"
}
],
"notes": [
{
"category": "description",
"text": "When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it can lead to a denial of service. The flaw exists in the `xml.dom.minidom` module of cpython, where a quadratic algorithm in methods like `appendChild()` can be triggered when processing excessively nested XML documents. When successfully exploited this may impact the availability of applications utilizing this functionality across affected Red Hat products.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12084"
},
{
"category": "external",
"summary": "RHBZ#2418655",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418655"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12084",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12084"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/142145",
"url": "https://github.com/python/cpython/issues/142145"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/142146",
"url": "https://github.com/python/cpython/pull/142146"
}
],
"release_date": "2025-12-03T18:55:32.222000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service"
},
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
},
{
"cve": "CVE-2025-13836",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-01T19:01:03.091899+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418078"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the http.client module in the Python standard library. When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This issue allows a malicious server to cause the client to read large amounts of data into memory, potentially causing memory allocations errors, swapping, out-of-memory conditions or even system freezes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: Excessive read buffering DoS in http.client",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue can only be exploited by Python applications using the http.client.HTTPResponse.read function without the amount parameter, which specifies the read size in bytes. Note that Python libraries may use this function internally and make applications vulnerable. Additionally, vulnerable Python applications must connect to a malicious or compromised server that replies with a very large or crafted Content-Length header to trigger this issue, limiting the exposure of this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13836"
},
{
"category": "external",
"summary": "RHBZ#2418078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418078"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13836",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13836"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/119451",
"url": "https://github.com/python/cpython/issues/119451"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/119454",
"url": "https://github.com/python/cpython/pull/119454"
}
],
"release_date": "2025-12-01T18:02:38.483000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Since this vulnerability is triggered when no read amount is specified and the client defaults to using the potentially malicious Content-Length header, developers can mitigate this issue in their code by always imposing an explicit, safe limit on data reads.\n\nApplications using the http.client.HTTPResponse.read function directly can ensure that read operations specify a byte limit:\n\n~~~\n...\nmax_safe_read = 10 * 1024 * 1024\ndata = response.read(max_safe_read)\n...\n~~~",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: Excessive read buffering DoS in http.client"
},
{
"cve": "CVE-2025-14104",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-12-05T14:16:36.004000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419369"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "RHBZ#2419369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104"
}
],
"release_date": "2025-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames"
},
{
"cve": "CVE-2025-15467",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-01-16T14:21:50.710000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430376"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. On Red Hat Enterprise Linux, OpenSSL is built with stack protections enabled which mitigate the risk of code execution though a denial-of-service condition remains possible. This vulnerability only affects applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers, such as Kerberos using the PKINIT plugin. OpenSSL versions 1.1.1 and 1.0.2 are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "RHBZ#2430376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467"
}
],
"release_date": "2026-01-27T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing"
},
{
"cve": "CVE-2025-15468",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2026-01-16T14:21:51.062000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430377"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat. The NULL pointer dereference in the `SSL_CIPHER_find()` function, affecting OpenSSL versions 3.3, 3.4, 3.5, and 3.6, occurs only when applications utilizing the QUIC protocol uncommonly invoke this function from the `client_hello_cb` callback with an unknown cipher ID. This specific usage pattern and the resulting Denial of Service limit the overall impact in the Red Hat context.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15468"
},
{
"category": "external",
"summary": "RHBZ#2430377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430377"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15468",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15468"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling"
},
{
"cve": "CVE-2025-15469",
"cwe": {
"id": "CWE-1284",
"name": "Improper Validation of Specified Quantity in Input"
},
"discovery_date": "2026-01-16T14:21:51.411000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430378"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat. The flaw affects the `openssl dgst` command-line tool when used with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) on files larger than 16MB. Impact is limited as it requires both signing and verification to be performed using the affected command, and verifiers using library APIs are not impacted.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15469"
},
{
"category": "external",
"summary": "RHBZ#2430378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430378"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15469",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15469"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "To mitigate this issue, avoid using the `openssl dgst` command with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) for files larger than 16MB. Instead, utilize streaming digest algorithms with `openssl dgst` or use library APIs for signing and verification, as these are not affected by the truncation vulnerability. Users should ensure that input files for one-shot signing/verification with `openssl dgst` do not exceed 16MB.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation"
},
{
"cve": "CVE-2025-66199",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-16T14:21:51.739000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. The flaw in OpenSSL 3.3, 3.4, 3.5, and 3.6 allows an attacker to cause excessive memory allocation during TLS 1.3 handshake with certificate compression, potentially leading to a Denial of Service. This affects both clients and servers in mutual TLS scenarios where certificate compression is negotiated. Servers not requesting client certificates are not vulnerable to client-initiated attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66199"
},
{
"category": "external",
"summary": "RHBZ#2430379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66199",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66199"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "To mitigate this issue, disable the reception of compressed certificates by setting the SSL_OP_NO_RX_CERTIFICATE_COMPRESSION option in OpenSSL configurations. This will prevent the vulnerable code path from being exercised.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-68160",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2026-01-16T14:21:52.088000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430380"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat. The `BIO_f_linebuffer` filter, where this heap out-of-bounds write occurs, is not used by default in TLS/SSL data paths within Red Hat products. Exploitation requires third-party applications to explicitly use this filter with a BIO chain that can short-write and process large, newline-free data influenced by an attacker, which is an unlikely scenario under attacker control. Red Hat FIPS modules are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68160"
},
{
"category": "external",
"summary": "RHBZ#2430380",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430380"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68160",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68160"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter"
},
{
"cve": "CVE-2025-68973",
"cwe": {
"id": "CWE-675",
"name": "Multiple Operations on Resource in Single-Operation Context"
},
"discovery_date": "2025-12-28T17:00:44.161022+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425966"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in GnuPG\u0027s `armor_filter` function allows an attacker with local access to provide crafted input, potentially leading to information disclosure and arbitrary code execution due to an out-of-bounds write. Exploitation requires high attack complexity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68973"
},
{
"category": "external",
"summary": "RHBZ#2425966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425966"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68973",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68973"
},
{
"category": "external",
"summary": "https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306",
"url": "https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306"
},
{
"category": "external",
"summary": "https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9",
"url": "https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9"
},
{
"category": "external",
"summary": "https://gpg.fail/memcpy",
"url": "https://gpg.fail/memcpy"
},
{
"category": "external",
"summary": "https://news.ycombinator.com/item?id=46403200",
"url": "https://news.ycombinator.com/item?id=46403200"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/12/28/5",
"url": "https://www.openwall.com/lists/oss-security/2025/12/28/5"
}
],
"release_date": "2025-12-28T16:19:11.019000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid processing untrusted or unverified input with GnuPG. Exercise caution when handling GnuPG-encrypted or signed data from unknown or suspicious sources, as specially crafted input could trigger the vulnerability. This operational control reduces the attack surface by limiting exposure to malicious data.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write"
},
{
"cve": "CVE-2025-69418",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2026-01-16T14:21:52.438000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430381"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. In the Red Hat context, impact is limited because typical OpenSSL consumers using higher-level EVP APIs are not affected. The flaw only manifests when applications directly call low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in hardware-accelerated builds. Additionally, TLS does not use OCB ciphersuites, and FIPS modules are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69418"
},
{
"category": "external",
"summary": "RHBZ#2430381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69418"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls"
},
{
"cve": "CVE-2025-69419",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-01-16T14:21:52.793000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430386"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat. An out-of-bounds write in OpenSSL\u0027s PKCS12_get_friendlyname() function can lead to denial of service or arbitrary code execution. Exploitation requires an application to parse a specially crafted malicious PKCS#12 file. Red Hat FIPS modules are not affected as the PKCS#12 implementation is outside the FIPS module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69419"
},
{
"category": "external",
"summary": "RHBZ#2430386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69419",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69419"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, Red Hat recommends avoiding the processing of PKCS#12 files from untrusted or unverified sources. Applications that use the `PKCS12_get_friendlyname()` API should ensure that PKCS#12 files are only processed if they originate from trusted entities. Restricting the input sources for PKCS#12 files can significantly reduce the attack surface for this flaw.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing"
},
{
"cve": "CVE-2025-69420",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-01-16T14:21:53.497000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430388"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. A type confusion flaw in the TimeStamp Response verification code can lead to a Denial of Service when processing a specially crafted TimeStamp Response. Exploitation requires an application to call `TS_RESP_verify_response()` with a malformed response, and the TimeStamp protocol (RFC 3161) is not widely used. Red Hat FIPS modules are not affected as the TimeStamp Response implementation is outside the FIPS module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69420"
},
{
"category": "external",
"summary": "RHBZ#2430388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69420"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response"
},
{
"cve": "CVE-2025-69421",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2026-01-16T14:21:53.845000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430387"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat because it requires an application to process a specially crafted, malformed PKCS#12 file, leading to a Denial of Service. The vulnerability is limited to a crash and cannot be escalated to achieve code execution or memory disclosure. Red Hat FIPS modules are not affected as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69421"
},
{
"category": "external",
"summary": "RHBZ#2430387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69421",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69421"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
},
{
"cve": "CVE-2026-22795",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-01-16T14:21:53.146000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430389"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. An application processing a maliciously crafted PKCS#12 file can be caused to dereference an invalid or NULL pointer, resulting in a Denial of Service. In the Red Hat context, impact is limited as PKCS#12 files are typically used for trusted private keys and are not commonly accepted from untrusted sources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22795"
},
{
"category": "external",
"summary": "RHBZ#2430389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22795",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22795"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing"
},
{
"cve": "CVE-2026-22796",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"discovery_date": "2026-01-16T14:43:21.598000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430390"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. A type confusion flaw in the legacy PKCS#7 API can lead to a Denial of Service when processing specially crafted PKCS#7 data. Exploitation requires an application to perform signature verification of malformed PKCS#7 data. Red Hat products utilizing the FIPS module are not affected as the PKCS#7 parsing is outside the module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22796"
},
{
"category": "external",
"summary": "RHBZ#2430390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430390"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22796"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification"
}
]
}
RHSA-2026:1696
Vulnerability from csaf_redhat - Published: 2026-02-02 10:18 - Updated: 2026-02-17 09:27Summary
Red Hat Security Advisory: util-linux security update
Notes
Topic
An update for util-linux is now available for Red Hat Enterprise Linux 10.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program.
Security Fix(es):
* util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames (CVE-2025-14104)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for util-linux is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program.\n\nSecurity Fix(es):\n\n* util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames (CVE-2025-14104)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1696",
"url": "https://access.redhat.com/errata/RHSA-2026:1696"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2419369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1696.json"
}
],
"title": "Red Hat Security Advisory: util-linux security update",
"tracking": {
"current_release_date": "2026-02-17T09:27:37+00:00",
"generator": {
"date": "2026-02-17T09:27:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1696",
"initial_release_date": "2026-02-02T10:18:28+00:00",
"revision_history": [
{
"date": "2026-02-02T10:18:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-02T10:18:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-17T09:27:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"product_id": "libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-devel@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libmount-devel-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "libmount-devel-0:2.40.2-15.el10_1.aarch64",
"product_id": "libmount-devel-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-devel@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"product_id": "libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-devel@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "python3-libmount-0:2.40.2-15.el10_1.aarch64",
"product_id": "python3-libmount-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "uuidd-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "uuidd-0:2.40.2-15.el10_1.aarch64",
"product_id": "uuidd-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"product_id": "util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debugsource@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_id": "libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-debuginfo@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_id": "libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-debuginfo@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_id": "libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-debuginfo@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_id": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-debuginfo@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_id": "libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-debuginfo@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_id": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount-debuginfo@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_id": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-core-debuginfo@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_id": "util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debuginfo@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_id": "uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd-debuginfo@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libblkid-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "libblkid-0:2.40.2-15.el10_1.aarch64",
"product_id": "libblkid-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "libfdisk-0:2.40.2-15.el10_1.aarch64",
"product_id": "libfdisk-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libmount-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "libmount-0:2.40.2-15.el10_1.aarch64",
"product_id": "libmount-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "libsmartcols-0:2.40.2-15.el10_1.aarch64",
"product_id": "libsmartcols-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libuuid-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "libuuid-0:2.40.2-15.el10_1.aarch64",
"product_id": "libuuid-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "util-linux-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "util-linux-0:2.40.2-15.el10_1.aarch64",
"product_id": "util-linux-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "util-linux-core-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "util-linux-core-0:2.40.2-15.el10_1.aarch64",
"product_id": "util-linux-core-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-core@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"product_id": "libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-devel@2.40.2-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"product": {
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"product_id": "libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-devel@2.40.2-15.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"product_id": "libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-devel@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"product_id": "libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-devel@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"product_id": "libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-devel@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"product_id": "python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "uuidd-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "uuidd-0:2.40.2-15.el10_1.ppc64le",
"product_id": "uuidd-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"product_id": "util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debugsource@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_id": "libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-debuginfo@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_id": "libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-debuginfo@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_id": "libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-debuginfo@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_id": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-debuginfo@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_id": "libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-debuginfo@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_id": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount-debuginfo@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_id": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-core-debuginfo@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_id": "util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debuginfo@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_id": "uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd-debuginfo@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libblkid-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "libblkid-0:2.40.2-15.el10_1.ppc64le",
"product_id": "libblkid-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libfdisk-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "libfdisk-0:2.40.2-15.el10_1.ppc64le",
"product_id": "libfdisk-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libmount-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "libmount-0:2.40.2-15.el10_1.ppc64le",
"product_id": "libmount-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"product_id": "libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libuuid-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "libuuid-0:2.40.2-15.el10_1.ppc64le",
"product_id": "libuuid-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "util-linux-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "util-linux-0:2.40.2-15.el10_1.ppc64le",
"product_id": "util-linux-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"product_id": "util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-core@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"product_id": "libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-devel@2.40.2-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"product": {
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"product_id": "libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-devel@2.40.2-15.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"product_id": "libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-devel@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libmount-devel-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "libmount-devel-0:2.40.2-15.el10_1.x86_64",
"product_id": "libmount-devel-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-devel@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"product_id": "libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-devel@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "python3-libmount-0:2.40.2-15.el10_1.x86_64",
"product_id": "python3-libmount-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "uuidd-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "uuidd-0:2.40.2-15.el10_1.x86_64",
"product_id": "uuidd-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"product_id": "util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debugsource@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_id": "libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-debuginfo@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_id": "libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-debuginfo@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_id": "libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-debuginfo@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_id": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-debuginfo@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_id": "libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-debuginfo@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_id": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount-debuginfo@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_id": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-core-debuginfo@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_id": "util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debuginfo@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_id": "uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd-debuginfo@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libblkid-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "libblkid-0:2.40.2-15.el10_1.x86_64",
"product_id": "libblkid-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "libfdisk-0:2.40.2-15.el10_1.x86_64",
"product_id": "libfdisk-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libmount-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "libmount-0:2.40.2-15.el10_1.x86_64",
"product_id": "libmount-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "libsmartcols-0:2.40.2-15.el10_1.x86_64",
"product_id": "libsmartcols-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libuuid-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "libuuid-0:2.40.2-15.el10_1.x86_64",
"product_id": "libuuid-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "util-linux-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "util-linux-0:2.40.2-15.el10_1.x86_64",
"product_id": "util-linux-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "util-linux-core-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "util-linux-core-0:2.40.2-15.el10_1.x86_64",
"product_id": "util-linux-core-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-core@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"product_id": "libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-devel@2.40.2-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"product": {
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"product_id": "libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-devel@2.40.2-15.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "libblkid-devel-0:2.40.2-15.el10_1.s390x",
"product_id": "libblkid-devel-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-devel@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libmount-devel-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "libmount-devel-0:2.40.2-15.el10_1.s390x",
"product_id": "libmount-devel-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-devel@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libuuid-devel-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "libuuid-devel-0:2.40.2-15.el10_1.s390x",
"product_id": "libuuid-devel-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-devel@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "python3-libmount-0:2.40.2-15.el10_1.s390x",
"product_id": "python3-libmount-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "uuidd-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "uuidd-0:2.40.2-15.el10_1.s390x",
"product_id": "uuidd-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"product_id": "util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debugsource@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_id": "libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-debuginfo@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_id": "libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-debuginfo@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_id": "libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-debuginfo@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_id": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-debuginfo@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_id": "libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-debuginfo@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_id": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount-debuginfo@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_id": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-core-debuginfo@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_id": "util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debuginfo@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_id": "uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd-debuginfo@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libblkid-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "libblkid-0:2.40.2-15.el10_1.s390x",
"product_id": "libblkid-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libfdisk-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "libfdisk-0:2.40.2-15.el10_1.s390x",
"product_id": "libfdisk-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libmount-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "libmount-0:2.40.2-15.el10_1.s390x",
"product_id": "libmount-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "libsmartcols-0:2.40.2-15.el10_1.s390x",
"product_id": "libsmartcols-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libuuid-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "libuuid-0:2.40.2-15.el10_1.s390x",
"product_id": "libuuid-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "util-linux-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "util-linux-0:2.40.2-15.el10_1.s390x",
"product_id": "util-linux-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "util-linux-core-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "util-linux-core-0:2.40.2-15.el10_1.s390x",
"product_id": "util-linux-core-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-core@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"product_id": "libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-devel@2.40.2-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"product": {
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"product_id": "libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-devel@2.40.2-15.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "util-linux-0:2.40.2-15.el10_1.src",
"product": {
"name": "util-linux-0:2.40.2-15.el10_1.src",
"product_id": "util-linux-0:2.40.2-15.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux@2.40.2-15.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libblkid-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libblkid-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libblkid-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libblkid-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libblkid-devel-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libfdisk-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libfdisk-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libfdisk-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libfdisk-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libmount-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libmount-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libmount-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libmount-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libmount-devel-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libmount-devel-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libmount-devel-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libsmartcols-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libsmartcols-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libsmartcols-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libuuid-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libuuid-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libuuid-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libuuid-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libuuid-devel-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "python3-libmount-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "python3-libmount-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "python3-libmount-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "util-linux-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "util-linux-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "util-linux-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.40.2-15.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.src"
},
"product_reference": "util-linux-0:2.40.2-15.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "util-linux-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "util-linux-core-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "util-linux-core-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "util-linux-core-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "uuidd-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "uuidd-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "uuidd-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "uuidd-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libblkid-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libblkid-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libblkid-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libblkid-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libblkid-devel-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libfdisk-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libfdisk-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libfdisk-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libfdisk-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libmount-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libmount-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libmount-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libmount-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libmount-devel-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libmount-devel-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libmount-devel-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libsmartcols-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libsmartcols-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libsmartcols-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libuuid-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libuuid-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libuuid-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libuuid-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libuuid-devel-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "python3-libmount-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "python3-libmount-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "python3-libmount-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "util-linux-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "util-linux-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "util-linux-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.40.2-15.el10_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.src"
},
"product_reference": "util-linux-0:2.40.2-15.el10_1.src",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "util-linux-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "util-linux-core-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "util-linux-core-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "util-linux-core-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "uuidd-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "uuidd-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "uuidd-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "uuidd-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libblkid-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libblkid-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libblkid-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libblkid-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libblkid-devel-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libfdisk-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libfdisk-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libfdisk-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libfdisk-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libmount-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libmount-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libmount-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libmount-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libmount-devel-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libmount-devel-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libmount-devel-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libsmartcols-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libsmartcols-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libsmartcols-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libuuid-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libuuid-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libuuid-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libuuid-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "libuuid-devel-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "python3-libmount-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "python3-libmount-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "python3-libmount-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "util-linux-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "util-linux-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "util-linux-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.40.2-15.el10_1.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.src"
},
"product_reference": "util-linux-0:2.40.2-15.el10_1.src",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "util-linux-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "util-linux-core-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "util-linux-core-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "util-linux-core-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "uuidd-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "uuidd-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "uuidd-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "uuidd-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64"
},
"product_reference": "uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le"
},
"product_reference": "uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.s390x"
},
"product_reference": "uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64"
},
"product_reference": "uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14104",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-12-05T14:16:36.004000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419369"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.src",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.src",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.src",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "RHBZ#2419369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104"
}
],
"release_date": "2025-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T10:18:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.src",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.src",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.src",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1696"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.src",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.src",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.src",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libblkid-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libfdisk-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libmount-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libuuid-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.src",
"AppStream-10.1.Z:util-linux-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:uuidd-0:2.40.2-15.el10_1.x86_64",
"AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"AppStream-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libblkid-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libfdisk-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libmount-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libuuid-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.src",
"BaseOS-10.1.Z:util-linux-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:uuidd-0:2.40.2-15.el10_1.x86_64",
"BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"BaseOS-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libblkid-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libblkid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libblkid-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libfdisk-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libfdisk-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libfdisk-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libmount-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libmount-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libsmartcols-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libsmartcols-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libsmartcols-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libuuid-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libuuid-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:libuuid-devel-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:python3-libmount-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:python3-libmount-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.src",
"CRB-10.1.Z:util-linux-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-core-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-core-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-debuginfo-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:util-linux-debugsource-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:uuidd-0:2.40.2-15.el10_1.x86_64",
"CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.aarch64",
"CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.ppc64le",
"CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.s390x",
"CRB-10.1.Z:uuidd-debuginfo-0:2.40.2-15.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames"
}
]
}
RHSA-2026:1852
Vulnerability from csaf_redhat - Published: 2026-02-04 11:22 - Updated: 2026-02-17 09:27Summary
Red Hat Security Advisory: util-linux security update
Notes
Topic
An update for util-linux is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program.
Security Fix(es):
* util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames (CVE-2025-14104)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for util-linux is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program.\n\nSecurity Fix(es):\n\n* util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames (CVE-2025-14104)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1852",
"url": "https://access.redhat.com/errata/RHSA-2026:1852"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2419369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1852.json"
}
],
"title": "Red Hat Security Advisory: util-linux security update",
"tracking": {
"current_release_date": "2026-02-17T09:27:46+00:00",
"generator": {
"date": "2026-02-17T09:27:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1852",
"initial_release_date": "2026-02-04T11:22:56+00:00",
"revision_history": [
{
"date": "2026-02-04T11:22:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-04T11:22:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-17T09:27:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-libmount-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "python3-libmount-0:2.32.1-48.el8_10.s390x",
"product_id": "python3-libmount-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"product_id": "util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debugsource@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_id": "libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-debuginfo@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_id": "libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-debuginfo@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_id": "libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-debuginfo@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_id": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-debuginfo@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_id": "libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-debuginfo@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_id": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount-debuginfo@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_id": "util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debuginfo@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_id": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user-debuginfo@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_id": "uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd-debuginfo@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libblkid-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "libblkid-0:2.32.1-48.el8_10.s390x",
"product_id": "libblkid-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libblkid-devel-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.s390x",
"product_id": "libblkid-devel-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-devel@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libfdisk-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "libfdisk-0:2.32.1-48.el8_10.s390x",
"product_id": "libfdisk-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"product_id": "libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-devel@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libmount-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "libmount-0:2.32.1-48.el8_10.s390x",
"product_id": "libmount-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "libsmartcols-0:2.32.1-48.el8_10.s390x",
"product_id": "libsmartcols-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"product_id": "libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-devel@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libuuid-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "libuuid-0:2.32.1-48.el8_10.s390x",
"product_id": "libuuid-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libuuid-devel-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.s390x",
"product_id": "libuuid-devel-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-devel@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "util-linux-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "util-linux-0:2.32.1-48.el8_10.s390x",
"product_id": "util-linux-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "util-linux-user-0:2.32.1-48.el8_10.s390x",
"product_id": "util-linux-user-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "uuidd-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "uuidd-0:2.32.1-48.el8_10.s390x",
"product_id": "uuidd-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd@2.32.1-48.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libmount-devel-0:2.32.1-48.el8_10.s390x",
"product": {
"name": "libmount-devel-0:2.32.1-48.el8_10.s390x",
"product_id": "libmount-devel-0:2.32.1-48.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-devel@2.32.1-48.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-libmount-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "python3-libmount-0:2.32.1-48.el8_10.aarch64",
"product_id": "python3-libmount-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"product_id": "util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debugsource@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_id": "libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-debuginfo@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_id": "libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-debuginfo@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_id": "libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-debuginfo@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_id": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-debuginfo@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_id": "libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-debuginfo@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_id": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount-debuginfo@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_id": "util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debuginfo@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_id": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user-debuginfo@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_id": "uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd-debuginfo@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libblkid-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "libblkid-0:2.32.1-48.el8_10.aarch64",
"product_id": "libblkid-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"product_id": "libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-devel@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "libfdisk-0:2.32.1-48.el8_10.aarch64",
"product_id": "libfdisk-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"product_id": "libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-devel@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libmount-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "libmount-0:2.32.1-48.el8_10.aarch64",
"product_id": "libmount-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "libsmartcols-0:2.32.1-48.el8_10.aarch64",
"product_id": "libsmartcols-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"product_id": "libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-devel@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libuuid-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "libuuid-0:2.32.1-48.el8_10.aarch64",
"product_id": "libuuid-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"product_id": "libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-devel@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "util-linux-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "util-linux-0:2.32.1-48.el8_10.aarch64",
"product_id": "util-linux-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "util-linux-user-0:2.32.1-48.el8_10.aarch64",
"product_id": "util-linux-user-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "uuidd-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "uuidd-0:2.32.1-48.el8_10.aarch64",
"product_id": "uuidd-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd@2.32.1-48.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libmount-devel-0:2.32.1-48.el8_10.aarch64",
"product": {
"name": "libmount-devel-0:2.32.1-48.el8_10.aarch64",
"product_id": "libmount-devel-0:2.32.1-48.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-devel@2.32.1-48.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"product_id": "python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"product_id": "util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debugsource@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_id": "libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-debuginfo@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_id": "libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-debuginfo@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_id": "libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-debuginfo@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_id": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-debuginfo@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_id": "libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-debuginfo@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_id": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount-debuginfo@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_id": "util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debuginfo@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_id": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user-debuginfo@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_id": "uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd-debuginfo@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libblkid-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "libblkid-0:2.32.1-48.el8_10.ppc64le",
"product_id": "libblkid-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"product_id": "libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-devel@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libfdisk-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "libfdisk-0:2.32.1-48.el8_10.ppc64le",
"product_id": "libfdisk-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"product_id": "libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-devel@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libmount-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "libmount-0:2.32.1-48.el8_10.ppc64le",
"product_id": "libmount-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"product_id": "libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"product_id": "libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-devel@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libuuid-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "libuuid-0:2.32.1-48.el8_10.ppc64le",
"product_id": "libuuid-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"product_id": "libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-devel@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "util-linux-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "util-linux-0:2.32.1-48.el8_10.ppc64le",
"product_id": "util-linux-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"product_id": "util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "uuidd-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "uuidd-0:2.32.1-48.el8_10.ppc64le",
"product_id": "uuidd-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd@2.32.1-48.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"product": {
"name": "libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"product_id": "libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-devel@2.32.1-48.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-libmount-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "python3-libmount-0:2.32.1-48.el8_10.x86_64",
"product_id": "python3-libmount-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"product_id": "util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debugsource@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_id": "libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-debuginfo@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_id": "libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-debuginfo@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_id": "libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-debuginfo@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_id": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-debuginfo@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_id": "libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-debuginfo@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_id": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount-debuginfo@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_id": "util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debuginfo@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_id": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user-debuginfo@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_id": "uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd-debuginfo@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libblkid-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "libblkid-0:2.32.1-48.el8_10.x86_64",
"product_id": "libblkid-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"product_id": "libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-devel@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "libfdisk-0:2.32.1-48.el8_10.x86_64",
"product_id": "libfdisk-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"product_id": "libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-devel@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libmount-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "libmount-0:2.32.1-48.el8_10.x86_64",
"product_id": "libmount-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "libsmartcols-0:2.32.1-48.el8_10.x86_64",
"product_id": "libsmartcols-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"product_id": "libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-devel@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libuuid-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "libuuid-0:2.32.1-48.el8_10.x86_64",
"product_id": "libuuid-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"product_id": "libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-devel@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "util-linux-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "util-linux-0:2.32.1-48.el8_10.x86_64",
"product_id": "util-linux-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "util-linux-user-0:2.32.1-48.el8_10.x86_64",
"product_id": "util-linux-user-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "uuidd-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "uuidd-0:2.32.1-48.el8_10.x86_64",
"product_id": "uuidd-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd@2.32.1-48.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libmount-devel-0:2.32.1-48.el8_10.x86_64",
"product": {
"name": "libmount-devel-0:2.32.1-48.el8_10.x86_64",
"product_id": "libmount-devel-0:2.32.1-48.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-devel@2.32.1-48.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-0:2.32.1-48.el8_10.i686",
"product": {
"name": "libblkid-0:2.32.1-48.el8_10.i686",
"product_id": "libblkid-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libblkid-devel-0:2.32.1-48.el8_10.i686",
"product": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.i686",
"product_id": "libblkid-devel-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-devel@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libfdisk-0:2.32.1-48.el8_10.i686",
"product": {
"name": "libfdisk-0:2.32.1-48.el8_10.i686",
"product_id": "libfdisk-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libfdisk-devel-0:2.32.1-48.el8_10.i686",
"product": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.i686",
"product_id": "libfdisk-devel-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-devel@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libmount-0:2.32.1-48.el8_10.i686",
"product": {
"name": "libmount-0:2.32.1-48.el8_10.i686",
"product_id": "libmount-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-0:2.32.1-48.el8_10.i686",
"product": {
"name": "libsmartcols-0:2.32.1-48.el8_10.i686",
"product_id": "libsmartcols-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"product": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"product_id": "libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-devel@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libuuid-0:2.32.1-48.el8_10.i686",
"product": {
"name": "libuuid-0:2.32.1-48.el8_10.i686",
"product_id": "libuuid-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libuuid-devel-0:2.32.1-48.el8_10.i686",
"product": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.i686",
"product_id": "libuuid-devel-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-devel@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"product": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"product_id": "util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debugsource@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"product": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"product_id": "libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libblkid-debuginfo@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"product": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"product_id": "libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libfdisk-debuginfo@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"product": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"product_id": "libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-debuginfo@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"product": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"product_id": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsmartcols-debuginfo@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"product": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"product_id": "libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libuuid-debuginfo@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"product": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"product_id": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libmount-debuginfo@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"product": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"product_id": "util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-debuginfo@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"product": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"product_id": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux-user-debuginfo@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"product": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"product_id": "uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/uuidd-debuginfo@2.32.1-48.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libmount-devel-0:2.32.1-48.el8_10.i686",
"product": {
"name": "libmount-devel-0:2.32.1-48.el8_10.i686",
"product_id": "libmount-devel-0:2.32.1-48.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmount-devel@2.32.1-48.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "util-linux-0:2.32.1-48.el8_10.src",
"product": {
"name": "util-linux-0:2.32.1-48.el8_10.src",
"product_id": "util-linux-0:2.32.1-48.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/util-linux@2.32.1-48.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libblkid-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libblkid-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libblkid-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libblkid-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libblkid-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libblkid-devel-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libblkid-devel-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libfdisk-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libfdisk-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libfdisk-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libfdisk-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libfdisk-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libfdisk-devel-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libmount-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libmount-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libmount-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libmount-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libmount-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libmount-devel-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libmount-devel-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libmount-devel-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libmount-devel-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libsmartcols-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libsmartcols-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libsmartcols-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libsmartcols-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libuuid-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libuuid-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libuuid-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libuuid-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libuuid-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libuuid-devel-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libuuid-devel-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "python3-libmount-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "python3-libmount-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "python3-libmount-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "util-linux-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "util-linux-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "util-linux-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.32.1-48.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.src"
},
"product_reference": "util-linux-0:2.32.1-48.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "util-linux-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.i686"
},
"product_reference": "util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "util-linux-user-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "util-linux-user-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "util-linux-user-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "uuidd-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "uuidd-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "uuidd-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "uuidd-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libblkid-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libblkid-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libblkid-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libblkid-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libblkid-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libblkid-devel-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libblkid-devel-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libfdisk-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libfdisk-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libfdisk-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libfdisk-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libfdisk-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libfdisk-devel-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libmount-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libmount-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libmount-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libmount-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libmount-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libmount-devel-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libmount-devel-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libmount-devel-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libmount-devel-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libsmartcols-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libsmartcols-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libsmartcols-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libsmartcols-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libuuid-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libuuid-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libuuid-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libuuid-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libuuid-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libuuid-devel-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libuuid-devel-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "python3-libmount-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "python3-libmount-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "python3-libmount-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "util-linux-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "util-linux-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "util-linux-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.32.1-48.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.src"
},
"product_reference": "util-linux-0:2.32.1-48.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "util-linux-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.i686"
},
"product_reference": "util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "util-linux-user-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "util-linux-user-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "util-linux-user-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "uuidd-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "uuidd-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "uuidd-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "uuidd-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libblkid-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libblkid-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libblkid-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libblkid-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libblkid-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libblkid-devel-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libblkid-devel-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libfdisk-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libfdisk-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libfdisk-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libfdisk-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libfdisk-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libfdisk-devel-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libmount-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libmount-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libmount-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libmount-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libmount-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libmount-devel-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libmount-devel-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libmount-devel-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libmount-devel-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libsmartcols-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libsmartcols-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libsmartcols-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libsmartcols-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libuuid-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libuuid-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libuuid-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libuuid-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libuuid-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.i686"
},
"product_reference": "libuuid-devel-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "libuuid-devel-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "python3-libmount-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "python3-libmount-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "python3-libmount-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "util-linux-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "util-linux-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "util-linux-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.32.1-48.el8_10.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.src"
},
"product_reference": "util-linux-0:2.32.1-48.el8_10.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "util-linux-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.i686"
},
"product_reference": "util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-debugsource-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "util-linux-user-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "util-linux-user-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "util-linux-user-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "uuidd-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "uuidd-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "uuidd-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "uuidd-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64"
},
"product_reference": "uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.i686"
},
"product_reference": "uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le"
},
"product_reference": "uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.s390x"
},
"product_reference": "uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64"
},
"product_reference": "uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14104",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-12-05T14:16:36.004000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419369"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "RHBZ#2419369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104"
}
],
"release_date": "2025-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T11:22:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1852"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libblkid-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libfdisk-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libmount-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libmount-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libsmartcols-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libuuid-devel-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-libmount-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-debugsource-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:util-linux-user-debuginfo-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-0:2.32.1-48.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:uuidd-debuginfo-0:2.32.1-48.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames"
}
]
}
FKIE_CVE-2025-14104
Vulnerability from fkie_nvd - Published: 2025-12-05 17:16 - Updated: 2026-02-17 10:15
Severity ?
Summary
A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database."
}
],
"id": "CVE-2025-14104",
"lastModified": "2026-02-17T10:15:57.080",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 4.2,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2025-12-05T17:16:03.117",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:1696"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:1852"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:1913"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:2800"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
SUSE-SU-2026:0115-1
Vulnerability from csaf_suse - Published: 2026-01-12 15:03 - Updated: 2026-01-12 15:03Summary
Security update for util-linux
Notes
Title of the patch
Security update for util-linux
Description of the patch
This update for util-linux fixes the following issues:
- CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666).
- lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682).
Patchnames
SUSE-2026-115,openSUSE-SLE-15.6-2026-115
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for util-linux",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for util-linux fixes the following issues:\n\n- CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666).\n- lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-115,openSUSE-SLE-15.6-2026-115",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0115-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0115-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260115-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0115-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023734.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254666",
"url": "https://bugzilla.suse.com/1254666"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14104 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14104/"
}
],
"title": "Security update for util-linux",
"tracking": {
"current_release_date": "2026-01-12T15:03:44Z",
"generator": {
"date": "2026-01-12T15:03:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0115-1",
"initial_release_date": "2026-01-12T15:03:44Z",
"revision_history": [
{
"date": "2026-01-12T15:03:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "libblkid-devel-2.39.3-150600.4.15.1.aarch64",
"product_id": "libblkid-devel-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "libblkid-devel-static-2.39.3-150600.4.15.1.aarch64",
"product_id": "libblkid-devel-static-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "libblkid1-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "libblkid1-2.39.3-150600.4.15.1.aarch64",
"product_id": "libblkid1-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "libfdisk-devel-2.39.3-150600.4.15.1.aarch64",
"product_id": "libfdisk-devel-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "libfdisk-devel-static-2.39.3-150600.4.15.1.aarch64",
"product_id": "libfdisk-devel-static-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "libfdisk1-2.39.3-150600.4.15.1.aarch64",
"product_id": "libfdisk1-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "libmount-devel-2.39.3-150600.4.15.1.aarch64",
"product_id": "libmount-devel-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "libmount-devel-static-2.39.3-150600.4.15.1.aarch64",
"product_id": "libmount-devel-static-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount1-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "libmount1-2.39.3-150600.4.15.1.aarch64",
"product_id": "libmount1-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "libsmartcols-devel-2.39.3-150600.4.15.1.aarch64",
"product_id": "libsmartcols-devel-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "libsmartcols-devel-static-2.39.3-150600.4.15.1.aarch64",
"product_id": "libsmartcols-devel-static-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "libsmartcols1-2.39.3-150600.4.15.1.aarch64",
"product_id": "libsmartcols1-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "libuuid-devel-2.39.3-150600.4.15.1.aarch64",
"product_id": "libuuid-devel-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "libuuid-devel-static-2.39.3-150600.4.15.1.aarch64",
"product_id": "libuuid-devel-static-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid1-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "libuuid1-2.39.3-150600.4.15.1.aarch64",
"product_id": "libuuid1-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "python3-libmount-2.39.3-150600.4.15.1.aarch64",
"product_id": "python3-libmount-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "util-linux-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "util-linux-2.39.3-150600.4.15.1.aarch64",
"product_id": "util-linux-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "util-linux-systemd-2.39.3-150600.4.15.1.aarch64",
"product_id": "util-linux-systemd-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "util-linux-tty-tools-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "util-linux-tty-tools-2.39.3-150600.4.15.1.aarch64",
"product_id": "util-linux-tty-tools-2.39.3-150600.4.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "uuidd-2.39.3-150600.4.15.1.aarch64",
"product": {
"name": "uuidd-2.39.3-150600.4.15.1.aarch64",
"product_id": "uuidd-2.39.3-150600.4.15.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product": {
"name": "libblkid-devel-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product_id": "libblkid-devel-64bit-2.39.3-150600.4.15.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libblkid1-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product": {
"name": "libblkid1-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product_id": "libblkid1-64bit-2.39.3-150600.4.15.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product": {
"name": "libfdisk-devel-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product_id": "libfdisk-devel-64bit-2.39.3-150600.4.15.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libfdisk1-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product": {
"name": "libfdisk1-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product_id": "libfdisk1-64bit-2.39.3-150600.4.15.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libmount-devel-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product": {
"name": "libmount-devel-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product_id": "libmount-devel-64bit-2.39.3-150600.4.15.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libmount1-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product": {
"name": "libmount1-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product_id": "libmount1-64bit-2.39.3-150600.4.15.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product": {
"name": "libsmartcols-devel-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product_id": "libsmartcols-devel-64bit-2.39.3-150600.4.15.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libsmartcols1-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product": {
"name": "libsmartcols1-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product_id": "libsmartcols1-64bit-2.39.3-150600.4.15.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libuuid-devel-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product": {
"name": "libuuid-devel-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product_id": "libuuid-devel-64bit-2.39.3-150600.4.15.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libuuid1-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product": {
"name": "libuuid1-64bit-2.39.3-150600.4.15.1.aarch64_ilp32",
"product_id": "libuuid1-64bit-2.39.3-150600.4.15.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.39.3-150600.4.15.1.i586",
"product": {
"name": "libblkid-devel-2.39.3-150600.4.15.1.i586",
"product_id": "libblkid-devel-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.39.3-150600.4.15.1.i586",
"product": {
"name": "libblkid-devel-static-2.39.3-150600.4.15.1.i586",
"product_id": "libblkid-devel-static-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "libblkid1-2.39.3-150600.4.15.1.i586",
"product": {
"name": "libblkid1-2.39.3-150600.4.15.1.i586",
"product_id": "libblkid1-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.39.3-150600.4.15.1.i586",
"product": {
"name": "libfdisk-devel-2.39.3-150600.4.15.1.i586",
"product_id": "libfdisk-devel-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.39.3-150600.4.15.1.i586",
"product": {
"name": "libfdisk-devel-static-2.39.3-150600.4.15.1.i586",
"product_id": "libfdisk-devel-static-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.39.3-150600.4.15.1.i586",
"product": {
"name": "libfdisk1-2.39.3-150600.4.15.1.i586",
"product_id": "libfdisk1-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.39.3-150600.4.15.1.i586",
"product": {
"name": "libmount-devel-2.39.3-150600.4.15.1.i586",
"product_id": "libmount-devel-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.39.3-150600.4.15.1.i586",
"product": {
"name": "libmount-devel-static-2.39.3-150600.4.15.1.i586",
"product_id": "libmount-devel-static-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "libmount1-2.39.3-150600.4.15.1.i586",
"product": {
"name": "libmount1-2.39.3-150600.4.15.1.i586",
"product_id": "libmount1-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.39.3-150600.4.15.1.i586",
"product": {
"name": "libsmartcols-devel-2.39.3-150600.4.15.1.i586",
"product_id": "libsmartcols-devel-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.39.3-150600.4.15.1.i586",
"product": {
"name": "libsmartcols-devel-static-2.39.3-150600.4.15.1.i586",
"product_id": "libsmartcols-devel-static-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.39.3-150600.4.15.1.i586",
"product": {
"name": "libsmartcols1-2.39.3-150600.4.15.1.i586",
"product_id": "libsmartcols1-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.39.3-150600.4.15.1.i586",
"product": {
"name": "libuuid-devel-2.39.3-150600.4.15.1.i586",
"product_id": "libuuid-devel-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.39.3-150600.4.15.1.i586",
"product": {
"name": "libuuid-devel-static-2.39.3-150600.4.15.1.i586",
"product_id": "libuuid-devel-static-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "libuuid1-2.39.3-150600.4.15.1.i586",
"product": {
"name": "libuuid1-2.39.3-150600.4.15.1.i586",
"product_id": "libuuid1-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.39.3-150600.4.15.1.i586",
"product": {
"name": "python3-libmount-2.39.3-150600.4.15.1.i586",
"product_id": "python3-libmount-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "util-linux-2.39.3-150600.4.15.1.i586",
"product": {
"name": "util-linux-2.39.3-150600.4.15.1.i586",
"product_id": "util-linux-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.39.3-150600.4.15.1.i586",
"product": {
"name": "util-linux-systemd-2.39.3-150600.4.15.1.i586",
"product_id": "util-linux-systemd-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "util-linux-tty-tools-2.39.3-150600.4.15.1.i586",
"product": {
"name": "util-linux-tty-tools-2.39.3-150600.4.15.1.i586",
"product_id": "util-linux-tty-tools-2.39.3-150600.4.15.1.i586"
}
},
{
"category": "product_version",
"name": "uuidd-2.39.3-150600.4.15.1.i586",
"product": {
"name": "uuidd-2.39.3-150600.4.15.1.i586",
"product_id": "uuidd-2.39.3-150600.4.15.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "util-linux-lang-2.39.3-150600.4.15.1.noarch",
"product": {
"name": "util-linux-lang-2.39.3-150600.4.15.1.noarch",
"product_id": "util-linux-lang-2.39.3-150600.4.15.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "libblkid-devel-2.39.3-150600.4.15.1.ppc64le",
"product_id": "libblkid-devel-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "libblkid-devel-static-2.39.3-150600.4.15.1.ppc64le",
"product_id": "libblkid-devel-static-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libblkid1-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "libblkid1-2.39.3-150600.4.15.1.ppc64le",
"product_id": "libblkid1-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "libfdisk-devel-2.39.3-150600.4.15.1.ppc64le",
"product_id": "libfdisk-devel-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "libfdisk-devel-static-2.39.3-150600.4.15.1.ppc64le",
"product_id": "libfdisk-devel-static-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "libfdisk1-2.39.3-150600.4.15.1.ppc64le",
"product_id": "libfdisk1-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "libmount-devel-2.39.3-150600.4.15.1.ppc64le",
"product_id": "libmount-devel-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "libmount-devel-static-2.39.3-150600.4.15.1.ppc64le",
"product_id": "libmount-devel-static-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount1-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "libmount1-2.39.3-150600.4.15.1.ppc64le",
"product_id": "libmount1-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "libsmartcols-devel-2.39.3-150600.4.15.1.ppc64le",
"product_id": "libsmartcols-devel-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "libsmartcols-devel-static-2.39.3-150600.4.15.1.ppc64le",
"product_id": "libsmartcols-devel-static-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "libsmartcols1-2.39.3-150600.4.15.1.ppc64le",
"product_id": "libsmartcols1-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "libuuid-devel-2.39.3-150600.4.15.1.ppc64le",
"product_id": "libuuid-devel-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "libuuid-devel-static-2.39.3-150600.4.15.1.ppc64le",
"product_id": "libuuid-devel-static-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid1-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "libuuid1-2.39.3-150600.4.15.1.ppc64le",
"product_id": "libuuid1-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "python3-libmount-2.39.3-150600.4.15.1.ppc64le",
"product_id": "python3-libmount-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "util-linux-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "util-linux-2.39.3-150600.4.15.1.ppc64le",
"product_id": "util-linux-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "util-linux-systemd-2.39.3-150600.4.15.1.ppc64le",
"product_id": "util-linux-systemd-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "util-linux-tty-tools-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "util-linux-tty-tools-2.39.3-150600.4.15.1.ppc64le",
"product_id": "util-linux-tty-tools-2.39.3-150600.4.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uuidd-2.39.3-150600.4.15.1.ppc64le",
"product": {
"name": "uuidd-2.39.3-150600.4.15.1.ppc64le",
"product_id": "uuidd-2.39.3-150600.4.15.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "libblkid-devel-2.39.3-150600.4.15.1.s390x",
"product_id": "libblkid-devel-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "libblkid-devel-static-2.39.3-150600.4.15.1.s390x",
"product_id": "libblkid-devel-static-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libblkid1-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "libblkid1-2.39.3-150600.4.15.1.s390x",
"product_id": "libblkid1-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "libfdisk-devel-2.39.3-150600.4.15.1.s390x",
"product_id": "libfdisk-devel-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "libfdisk-devel-static-2.39.3-150600.4.15.1.s390x",
"product_id": "libfdisk-devel-static-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "libfdisk1-2.39.3-150600.4.15.1.s390x",
"product_id": "libfdisk1-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "libmount-devel-2.39.3-150600.4.15.1.s390x",
"product_id": "libmount-devel-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "libmount-devel-static-2.39.3-150600.4.15.1.s390x",
"product_id": "libmount-devel-static-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount1-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "libmount1-2.39.3-150600.4.15.1.s390x",
"product_id": "libmount1-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "libsmartcols-devel-2.39.3-150600.4.15.1.s390x",
"product_id": "libsmartcols-devel-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "libsmartcols-devel-static-2.39.3-150600.4.15.1.s390x",
"product_id": "libsmartcols-devel-static-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "libsmartcols1-2.39.3-150600.4.15.1.s390x",
"product_id": "libsmartcols1-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "libuuid-devel-2.39.3-150600.4.15.1.s390x",
"product_id": "libuuid-devel-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "libuuid-devel-static-2.39.3-150600.4.15.1.s390x",
"product_id": "libuuid-devel-static-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid1-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "libuuid1-2.39.3-150600.4.15.1.s390x",
"product_id": "libuuid1-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "python3-libmount-2.39.3-150600.4.15.1.s390x",
"product_id": "python3-libmount-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "util-linux-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "util-linux-2.39.3-150600.4.15.1.s390x",
"product_id": "util-linux-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "util-linux-extra-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "util-linux-extra-2.39.3-150600.4.15.1.s390x",
"product_id": "util-linux-extra-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "util-linux-systemd-2.39.3-150600.4.15.1.s390x",
"product_id": "util-linux-systemd-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "util-linux-tty-tools-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "util-linux-tty-tools-2.39.3-150600.4.15.1.s390x",
"product_id": "util-linux-tty-tools-2.39.3-150600.4.15.1.s390x"
}
},
{
"category": "product_version",
"name": "uuidd-2.39.3-150600.4.15.1.s390x",
"product": {
"name": "uuidd-2.39.3-150600.4.15.1.s390x",
"product_id": "uuidd-2.39.3-150600.4.15.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libblkid-devel-2.39.3-150600.4.15.1.x86_64",
"product_id": "libblkid-devel-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libblkid-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"product_id": "libblkid-devel-32bit-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libblkid-devel-static-2.39.3-150600.4.15.1.x86_64",
"product_id": "libblkid-devel-static-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid1-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libblkid1-2.39.3-150600.4.15.1.x86_64",
"product_id": "libblkid1-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid1-32bit-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libblkid1-32bit-2.39.3-150600.4.15.1.x86_64",
"product_id": "libblkid1-32bit-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libfdisk-devel-2.39.3-150600.4.15.1.x86_64",
"product_id": "libfdisk-devel-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libfdisk-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"product_id": "libfdisk-devel-32bit-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libfdisk-devel-static-2.39.3-150600.4.15.1.x86_64",
"product_id": "libfdisk-devel-static-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libfdisk1-2.39.3-150600.4.15.1.x86_64",
"product_id": "libfdisk1-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk1-32bit-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libfdisk1-32bit-2.39.3-150600.4.15.1.x86_64",
"product_id": "libfdisk1-32bit-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libmount-devel-2.39.3-150600.4.15.1.x86_64",
"product_id": "libmount-devel-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libmount-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"product_id": "libmount-devel-32bit-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libmount-devel-static-2.39.3-150600.4.15.1.x86_64",
"product_id": "libmount-devel-static-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount1-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libmount1-2.39.3-150600.4.15.1.x86_64",
"product_id": "libmount1-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount1-32bit-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libmount1-32bit-2.39.3-150600.4.15.1.x86_64",
"product_id": "libmount1-32bit-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libsmartcols-devel-2.39.3-150600.4.15.1.x86_64",
"product_id": "libsmartcols-devel-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libsmartcols-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"product_id": "libsmartcols-devel-32bit-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libsmartcols-devel-static-2.39.3-150600.4.15.1.x86_64",
"product_id": "libsmartcols-devel-static-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libsmartcols1-2.39.3-150600.4.15.1.x86_64",
"product_id": "libsmartcols1-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-32bit-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libsmartcols1-32bit-2.39.3-150600.4.15.1.x86_64",
"product_id": "libsmartcols1-32bit-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libuuid-devel-2.39.3-150600.4.15.1.x86_64",
"product_id": "libuuid-devel-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libuuid-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"product_id": "libuuid-devel-32bit-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libuuid-devel-static-2.39.3-150600.4.15.1.x86_64",
"product_id": "libuuid-devel-static-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid1-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libuuid1-2.39.3-150600.4.15.1.x86_64",
"product_id": "libuuid1-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid1-32bit-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "libuuid1-32bit-2.39.3-150600.4.15.1.x86_64",
"product_id": "libuuid1-32bit-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "python3-libmount-2.39.3-150600.4.15.1.x86_64",
"product_id": "python3-libmount-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "util-linux-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "util-linux-2.39.3-150600.4.15.1.x86_64",
"product_id": "util-linux-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "util-linux-systemd-2.39.3-150600.4.15.1.x86_64",
"product_id": "util-linux-systemd-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "util-linux-tty-tools-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "util-linux-tty-tools-2.39.3-150600.4.15.1.x86_64",
"product_id": "util-linux-tty-tools-2.39.3-150600.4.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "uuidd-2.39.3-150600.4.15.1.x86_64",
"product": {
"name": "uuidd-2.39.3-150600.4.15.1.x86_64",
"product_id": "uuidd-2.39.3-150600.4.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libblkid-devel-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "libblkid-devel-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libblkid-devel-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "libblkid-devel-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libblkid-devel-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "libblkid-devel-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libblkid-devel-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libblkid-devel-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-32bit-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libblkid-devel-32bit-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libblkid-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-static-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libblkid-devel-static-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "libblkid-devel-static-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-static-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libblkid-devel-static-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "libblkid-devel-static-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-static-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libblkid-devel-static-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "libblkid-devel-static-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-static-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libblkid-devel-static-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libblkid-devel-static-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libblkid1-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "libblkid1-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libblkid1-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "libblkid1-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libblkid1-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "libblkid1-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libblkid1-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libblkid1-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-32bit-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libblkid1-32bit-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libblkid1-32bit-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libfdisk-devel-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "libfdisk-devel-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libfdisk-devel-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "libfdisk-devel-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libfdisk-devel-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "libfdisk-devel-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libfdisk-devel-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libfdisk-devel-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-32bit-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libfdisk-devel-32bit-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libfdisk-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-static-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libfdisk-devel-static-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "libfdisk-devel-static-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-static-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libfdisk-devel-static-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "libfdisk-devel-static-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-static-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libfdisk-devel-static-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "libfdisk-devel-static-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-static-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libfdisk-devel-static-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libfdisk-devel-static-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libfdisk1-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "libfdisk1-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libfdisk1-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "libfdisk1-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libfdisk1-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "libfdisk1-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libfdisk1-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libfdisk1-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-32bit-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libfdisk1-32bit-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libfdisk1-32bit-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libmount-devel-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "libmount-devel-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libmount-devel-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "libmount-devel-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libmount-devel-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "libmount-devel-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libmount-devel-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libmount-devel-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-32bit-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libmount-devel-32bit-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libmount-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-static-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libmount-devel-static-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "libmount-devel-static-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-static-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libmount-devel-static-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "libmount-devel-static-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-static-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libmount-devel-static-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "libmount-devel-static-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-static-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libmount-devel-static-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libmount-devel-static-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libmount1-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "libmount1-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libmount1-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "libmount1-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libmount1-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "libmount1-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libmount1-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libmount1-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-32bit-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libmount1-32bit-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libmount1-32bit-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsmartcols-devel-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "libsmartcols-devel-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsmartcols-devel-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "libsmartcols-devel-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsmartcols-devel-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "libsmartcols-devel-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsmartcols-devel-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libsmartcols-devel-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-32bit-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsmartcols-devel-32bit-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libsmartcols-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-static-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsmartcols-devel-static-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "libsmartcols-devel-static-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-static-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsmartcols-devel-static-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "libsmartcols-devel-static-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-static-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsmartcols-devel-static-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "libsmartcols-devel-static-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-static-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsmartcols-devel-static-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libsmartcols-devel-static-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsmartcols1-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "libsmartcols1-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsmartcols1-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "libsmartcols1-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsmartcols1-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "libsmartcols1-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsmartcols1-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libsmartcols1-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-32bit-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsmartcols1-32bit-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libsmartcols1-32bit-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libuuid-devel-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "libuuid-devel-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libuuid-devel-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "libuuid-devel-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libuuid-devel-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "libuuid-devel-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libuuid-devel-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libuuid-devel-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-32bit-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libuuid-devel-32bit-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libuuid-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-static-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libuuid-devel-static-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "libuuid-devel-static-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-static-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libuuid-devel-static-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "libuuid-devel-static-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-static-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libuuid-devel-static-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "libuuid-devel-static-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-static-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libuuid-devel-static-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libuuid-devel-static-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libuuid1-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "libuuid1-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libuuid1-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "libuuid1-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libuuid1-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "libuuid1-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libuuid1-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libuuid1-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-32bit-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libuuid1-32bit-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "libuuid1-32bit-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-libmount-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "python3-libmount-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-libmount-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "python3-libmount-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-libmount-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "python3-libmount-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libmount-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-libmount-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "python3-libmount-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:util-linux-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "util-linux-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:util-linux-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "util-linux-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:util-linux-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "util-linux-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:util-linux-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "util-linux-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-lang-2.39.3-150600.4.15.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:util-linux-lang-2.39.3-150600.4.15.1.noarch"
},
"product_reference": "util-linux-lang-2.39.3-150600.4.15.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:util-linux-systemd-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "util-linux-systemd-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:util-linux-systemd-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "util-linux-systemd-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:util-linux-systemd-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "util-linux-systemd-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:util-linux-systemd-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "util-linux-systemd-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-tty-tools-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:util-linux-tty-tools-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "util-linux-tty-tools-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-tty-tools-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:util-linux-tty-tools-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "util-linux-tty-tools-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-tty-tools-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:util-linux-tty-tools-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "util-linux-tty-tools-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-tty-tools-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:util-linux-tty-tools-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "util-linux-tty-tools-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-2.39.3-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uuidd-2.39.3-150600.4.15.1.aarch64"
},
"product_reference": "uuidd-2.39.3-150600.4.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-2.39.3-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uuidd-2.39.3-150600.4.15.1.ppc64le"
},
"product_reference": "uuidd-2.39.3-150600.4.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-2.39.3-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uuidd-2.39.3-150600.4.15.1.s390x"
},
"product_reference": "uuidd-2.39.3-150600.4.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-2.39.3-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uuidd-2.39.3-150600.4.15.1.x86_64"
},
"product_reference": "uuidd-2.39.3-150600.4.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14104"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:libblkid-devel-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libblkid-devel-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libblkid-devel-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libblkid-devel-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libblkid-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libblkid-devel-static-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libblkid-devel-static-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libblkid-devel-static-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libblkid-devel-static-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libblkid1-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libblkid1-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libblkid1-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libblkid1-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libblkid1-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libfdisk-devel-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libfdisk-devel-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libfdisk-devel-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libfdisk-devel-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libfdisk-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libfdisk-devel-static-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libfdisk-devel-static-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libfdisk-devel-static-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libfdisk-devel-static-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libfdisk1-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libfdisk1-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libfdisk1-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libfdisk1-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libfdisk1-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libmount-devel-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libmount-devel-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libmount-devel-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libmount-devel-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libmount-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libmount-devel-static-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libmount-devel-static-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libmount-devel-static-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libmount-devel-static-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libmount1-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libmount1-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libmount1-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libmount1-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libmount1-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libsmartcols-devel-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libsmartcols-devel-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libsmartcols-devel-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libsmartcols-devel-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libsmartcols-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libsmartcols-devel-static-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libsmartcols-devel-static-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libsmartcols-devel-static-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libsmartcols-devel-static-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libsmartcols1-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libsmartcols1-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libsmartcols1-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libsmartcols1-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libsmartcols1-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libuuid-devel-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libuuid-devel-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libuuid-devel-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libuuid-devel-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libuuid-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libuuid-devel-static-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libuuid-devel-static-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libuuid-devel-static-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libuuid-devel-static-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libuuid1-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libuuid1-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libuuid1-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libuuid1-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libuuid1-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:python3-libmount-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:python3-libmount-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:python3-libmount-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:python3-libmount-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:util-linux-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:util-linux-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:util-linux-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:util-linux-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:util-linux-lang-2.39.3-150600.4.15.1.noarch",
"openSUSE Leap 15.6:util-linux-systemd-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:util-linux-systemd-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:util-linux-systemd-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:util-linux-systemd-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:util-linux-tty-tools-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:util-linux-tty-tools-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:util-linux-tty-tools-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:util-linux-tty-tools-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:uuidd-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:uuidd-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:uuidd-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:uuidd-2.39.3-150600.4.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14104",
"url": "https://www.suse.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "SUSE Bug 1254666 for CVE-2025-14104",
"url": "https://bugzilla.suse.com/1254666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:libblkid-devel-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libblkid-devel-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libblkid-devel-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libblkid-devel-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libblkid-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libblkid-devel-static-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libblkid-devel-static-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libblkid-devel-static-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libblkid-devel-static-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libblkid1-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libblkid1-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libblkid1-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libblkid1-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libblkid1-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libfdisk-devel-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libfdisk-devel-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libfdisk-devel-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libfdisk-devel-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libfdisk-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libfdisk-devel-static-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libfdisk-devel-static-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libfdisk-devel-static-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libfdisk-devel-static-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libfdisk1-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libfdisk1-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libfdisk1-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libfdisk1-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libfdisk1-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libmount-devel-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libmount-devel-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libmount-devel-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libmount-devel-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libmount-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libmount-devel-static-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libmount-devel-static-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libmount-devel-static-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libmount-devel-static-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libmount1-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libmount1-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libmount1-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libmount1-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libmount1-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libsmartcols-devel-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libsmartcols-devel-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libsmartcols-devel-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libsmartcols-devel-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libsmartcols-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libsmartcols-devel-static-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libsmartcols-devel-static-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libsmartcols-devel-static-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libsmartcols-devel-static-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libsmartcols1-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libsmartcols1-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libsmartcols1-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libsmartcols1-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libsmartcols1-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libuuid-devel-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libuuid-devel-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libuuid-devel-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libuuid-devel-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libuuid-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libuuid-devel-static-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libuuid-devel-static-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libuuid-devel-static-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libuuid-devel-static-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libuuid1-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libuuid1-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libuuid1-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libuuid1-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libuuid1-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:python3-libmount-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:python3-libmount-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:python3-libmount-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:python3-libmount-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:util-linux-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:util-linux-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:util-linux-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:util-linux-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:util-linux-lang-2.39.3-150600.4.15.1.noarch",
"openSUSE Leap 15.6:util-linux-systemd-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:util-linux-systemd-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:util-linux-systemd-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:util-linux-systemd-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:util-linux-tty-tools-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:util-linux-tty-tools-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:util-linux-tty-tools-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:util-linux-tty-tools-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:uuidd-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:uuidd-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:uuidd-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:uuidd-2.39.3-150600.4.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:libblkid-devel-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libblkid-devel-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libblkid-devel-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libblkid-devel-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libblkid-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libblkid-devel-static-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libblkid-devel-static-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libblkid-devel-static-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libblkid-devel-static-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libblkid1-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libblkid1-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libblkid1-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libblkid1-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libblkid1-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libfdisk-devel-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libfdisk-devel-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libfdisk-devel-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libfdisk-devel-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libfdisk-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libfdisk-devel-static-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libfdisk-devel-static-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libfdisk-devel-static-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libfdisk-devel-static-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libfdisk1-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libfdisk1-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libfdisk1-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libfdisk1-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libfdisk1-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libmount-devel-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libmount-devel-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libmount-devel-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libmount-devel-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libmount-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libmount-devel-static-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libmount-devel-static-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libmount-devel-static-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libmount-devel-static-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libmount1-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libmount1-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libmount1-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libmount1-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libmount1-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libsmartcols-devel-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libsmartcols-devel-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libsmartcols-devel-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libsmartcols-devel-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libsmartcols-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libsmartcols-devel-static-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libsmartcols-devel-static-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libsmartcols-devel-static-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libsmartcols-devel-static-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libsmartcols1-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libsmartcols1-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libsmartcols1-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libsmartcols1-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libsmartcols1-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libuuid-devel-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libuuid-devel-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libuuid-devel-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libuuid-devel-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libuuid-devel-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libuuid-devel-static-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libuuid-devel-static-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libuuid-devel-static-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libuuid-devel-static-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libuuid1-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:libuuid1-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:libuuid1-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:libuuid1-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:libuuid1-32bit-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:python3-libmount-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:python3-libmount-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:python3-libmount-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:python3-libmount-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:util-linux-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:util-linux-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:util-linux-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:util-linux-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:util-linux-lang-2.39.3-150600.4.15.1.noarch",
"openSUSE Leap 15.6:util-linux-systemd-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:util-linux-systemd-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:util-linux-systemd-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:util-linux-systemd-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:util-linux-tty-tools-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:util-linux-tty-tools-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:util-linux-tty-tools-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:util-linux-tty-tools-2.39.3-150600.4.15.1.x86_64",
"openSUSE Leap 15.6:uuidd-2.39.3-150600.4.15.1.aarch64",
"openSUSE Leap 15.6:uuidd-2.39.3-150600.4.15.1.ppc64le",
"openSUSE Leap 15.6:uuidd-2.39.3-150600.4.15.1.s390x",
"openSUSE Leap 15.6:uuidd-2.39.3-150600.4.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T15:03:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-14104"
}
]
}
SUSE-SU-2026:0510-1
Vulnerability from csaf_suse - Published: 2026-02-13 14:52 - Updated: 2026-02-13 14:52Summary
Security update for util-linux
Notes
Title of the patch
Security update for util-linux
Description of the patch
This update for util-linux fixes the following issues:
- CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666).
- lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682).
Patchnames
SUSE-2026-510,SUSE-SLE-Micro-5.3-2026-510,SUSE-SLE-Micro-5.4-2026-510
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for util-linux",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for util-linux fixes the following issues:\n\n- CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666).\n- lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-510,SUSE-SLE-Micro-5.3-2026-510,SUSE-SLE-Micro-5.4-2026-510",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0510-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0510-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260510-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0510-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024236.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254666",
"url": "https://bugzilla.suse.com/1254666"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14104 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14104/"
}
],
"title": "Security update for util-linux",
"tracking": {
"current_release_date": "2026-02-13T14:52:46Z",
"generator": {
"date": "2026-02-13T14:52:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0510-1",
"initial_release_date": "2026-02-13T14:52:46Z",
"revision_history": [
{
"date": "2026-02-13T14:52:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "libblkid-devel-2.37.2-150400.8.38.1.aarch64",
"product_id": "libblkid-devel-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "libblkid-devel-static-2.37.2-150400.8.38.1.aarch64",
"product_id": "libblkid-devel-static-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "libblkid1-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "libblkid1-2.37.2-150400.8.38.1.aarch64",
"product_id": "libblkid1-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "libfdisk-devel-2.37.2-150400.8.38.1.aarch64",
"product_id": "libfdisk-devel-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "libfdisk-devel-static-2.37.2-150400.8.38.1.aarch64",
"product_id": "libfdisk-devel-static-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "libfdisk1-2.37.2-150400.8.38.1.aarch64",
"product_id": "libfdisk1-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "libmount-devel-2.37.2-150400.8.38.1.aarch64",
"product_id": "libmount-devel-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "libmount-devel-static-2.37.2-150400.8.38.1.aarch64",
"product_id": "libmount-devel-static-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount1-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "libmount1-2.37.2-150400.8.38.1.aarch64",
"product_id": "libmount1-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "libsmartcols-devel-2.37.2-150400.8.38.1.aarch64",
"product_id": "libsmartcols-devel-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "libsmartcols-devel-static-2.37.2-150400.8.38.1.aarch64",
"product_id": "libsmartcols-devel-static-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "libsmartcols1-2.37.2-150400.8.38.1.aarch64",
"product_id": "libsmartcols1-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "libuuid-devel-2.37.2-150400.8.38.1.aarch64",
"product_id": "libuuid-devel-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "libuuid-devel-static-2.37.2-150400.8.38.1.aarch64",
"product_id": "libuuid-devel-static-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid1-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "libuuid1-2.37.2-150400.8.38.1.aarch64",
"product_id": "libuuid1-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "python3-libmount-2.37.2-150400.8.38.1.aarch64",
"product_id": "python3-libmount-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "util-linux-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "util-linux-2.37.2-150400.8.38.1.aarch64",
"product_id": "util-linux-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "util-linux-systemd-2.37.2-150400.8.38.1.aarch64",
"product_id": "util-linux-systemd-2.37.2-150400.8.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "uuidd-2.37.2-150400.8.38.1.aarch64",
"product": {
"name": "uuidd-2.37.2-150400.8.38.1.aarch64",
"product_id": "uuidd-2.37.2-150400.8.38.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product": {
"name": "libblkid-devel-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product_id": "libblkid-devel-64bit-2.37.2-150400.8.38.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libblkid1-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product": {
"name": "libblkid1-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product_id": "libblkid1-64bit-2.37.2-150400.8.38.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product": {
"name": "libfdisk-devel-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product_id": "libfdisk-devel-64bit-2.37.2-150400.8.38.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libfdisk1-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product": {
"name": "libfdisk1-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product_id": "libfdisk1-64bit-2.37.2-150400.8.38.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libmount-devel-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product": {
"name": "libmount-devel-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product_id": "libmount-devel-64bit-2.37.2-150400.8.38.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libmount1-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product": {
"name": "libmount1-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product_id": "libmount1-64bit-2.37.2-150400.8.38.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product": {
"name": "libsmartcols-devel-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product_id": "libsmartcols-devel-64bit-2.37.2-150400.8.38.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libsmartcols1-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product": {
"name": "libsmartcols1-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product_id": "libsmartcols1-64bit-2.37.2-150400.8.38.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libuuid-devel-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product": {
"name": "libuuid-devel-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product_id": "libuuid-devel-64bit-2.37.2-150400.8.38.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libuuid1-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product": {
"name": "libuuid1-64bit-2.37.2-150400.8.38.1.aarch64_ilp32",
"product_id": "libuuid1-64bit-2.37.2-150400.8.38.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.37.2-150400.8.38.1.i586",
"product": {
"name": "libblkid-devel-2.37.2-150400.8.38.1.i586",
"product_id": "libblkid-devel-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.37.2-150400.8.38.1.i586",
"product": {
"name": "libblkid-devel-static-2.37.2-150400.8.38.1.i586",
"product_id": "libblkid-devel-static-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "libblkid1-2.37.2-150400.8.38.1.i586",
"product": {
"name": "libblkid1-2.37.2-150400.8.38.1.i586",
"product_id": "libblkid1-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.37.2-150400.8.38.1.i586",
"product": {
"name": "libfdisk-devel-2.37.2-150400.8.38.1.i586",
"product_id": "libfdisk-devel-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.37.2-150400.8.38.1.i586",
"product": {
"name": "libfdisk-devel-static-2.37.2-150400.8.38.1.i586",
"product_id": "libfdisk-devel-static-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.37.2-150400.8.38.1.i586",
"product": {
"name": "libfdisk1-2.37.2-150400.8.38.1.i586",
"product_id": "libfdisk1-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.37.2-150400.8.38.1.i586",
"product": {
"name": "libmount-devel-2.37.2-150400.8.38.1.i586",
"product_id": "libmount-devel-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.37.2-150400.8.38.1.i586",
"product": {
"name": "libmount-devel-static-2.37.2-150400.8.38.1.i586",
"product_id": "libmount-devel-static-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "libmount1-2.37.2-150400.8.38.1.i586",
"product": {
"name": "libmount1-2.37.2-150400.8.38.1.i586",
"product_id": "libmount1-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.37.2-150400.8.38.1.i586",
"product": {
"name": "libsmartcols-devel-2.37.2-150400.8.38.1.i586",
"product_id": "libsmartcols-devel-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.37.2-150400.8.38.1.i586",
"product": {
"name": "libsmartcols-devel-static-2.37.2-150400.8.38.1.i586",
"product_id": "libsmartcols-devel-static-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.37.2-150400.8.38.1.i586",
"product": {
"name": "libsmartcols1-2.37.2-150400.8.38.1.i586",
"product_id": "libsmartcols1-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.37.2-150400.8.38.1.i586",
"product": {
"name": "libuuid-devel-2.37.2-150400.8.38.1.i586",
"product_id": "libuuid-devel-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.37.2-150400.8.38.1.i586",
"product": {
"name": "libuuid-devel-static-2.37.2-150400.8.38.1.i586",
"product_id": "libuuid-devel-static-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "libuuid1-2.37.2-150400.8.38.1.i586",
"product": {
"name": "libuuid1-2.37.2-150400.8.38.1.i586",
"product_id": "libuuid1-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.37.2-150400.8.38.1.i586",
"product": {
"name": "python3-libmount-2.37.2-150400.8.38.1.i586",
"product_id": "python3-libmount-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "util-linux-2.37.2-150400.8.38.1.i586",
"product": {
"name": "util-linux-2.37.2-150400.8.38.1.i586",
"product_id": "util-linux-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.37.2-150400.8.38.1.i586",
"product": {
"name": "util-linux-systemd-2.37.2-150400.8.38.1.i586",
"product_id": "util-linux-systemd-2.37.2-150400.8.38.1.i586"
}
},
{
"category": "product_version",
"name": "uuidd-2.37.2-150400.8.38.1.i586",
"product": {
"name": "uuidd-2.37.2-150400.8.38.1.i586",
"product_id": "uuidd-2.37.2-150400.8.38.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "util-linux-lang-2.37.2-150400.8.38.1.noarch",
"product": {
"name": "util-linux-lang-2.37.2-150400.8.38.1.noarch",
"product_id": "util-linux-lang-2.37.2-150400.8.38.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "libblkid-devel-2.37.2-150400.8.38.1.ppc64le",
"product_id": "libblkid-devel-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "libblkid-devel-static-2.37.2-150400.8.38.1.ppc64le",
"product_id": "libblkid-devel-static-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libblkid1-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "libblkid1-2.37.2-150400.8.38.1.ppc64le",
"product_id": "libblkid1-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "libfdisk-devel-2.37.2-150400.8.38.1.ppc64le",
"product_id": "libfdisk-devel-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "libfdisk-devel-static-2.37.2-150400.8.38.1.ppc64le",
"product_id": "libfdisk-devel-static-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "libfdisk1-2.37.2-150400.8.38.1.ppc64le",
"product_id": "libfdisk1-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "libmount-devel-2.37.2-150400.8.38.1.ppc64le",
"product_id": "libmount-devel-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "libmount-devel-static-2.37.2-150400.8.38.1.ppc64le",
"product_id": "libmount-devel-static-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount1-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "libmount1-2.37.2-150400.8.38.1.ppc64le",
"product_id": "libmount1-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "libsmartcols-devel-2.37.2-150400.8.38.1.ppc64le",
"product_id": "libsmartcols-devel-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "libsmartcols-devel-static-2.37.2-150400.8.38.1.ppc64le",
"product_id": "libsmartcols-devel-static-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "libsmartcols1-2.37.2-150400.8.38.1.ppc64le",
"product_id": "libsmartcols1-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "libuuid-devel-2.37.2-150400.8.38.1.ppc64le",
"product_id": "libuuid-devel-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "libuuid-devel-static-2.37.2-150400.8.38.1.ppc64le",
"product_id": "libuuid-devel-static-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid1-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "libuuid1-2.37.2-150400.8.38.1.ppc64le",
"product_id": "libuuid1-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "python3-libmount-2.37.2-150400.8.38.1.ppc64le",
"product_id": "python3-libmount-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "util-linux-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "util-linux-2.37.2-150400.8.38.1.ppc64le",
"product_id": "util-linux-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "util-linux-systemd-2.37.2-150400.8.38.1.ppc64le",
"product_id": "util-linux-systemd-2.37.2-150400.8.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uuidd-2.37.2-150400.8.38.1.ppc64le",
"product": {
"name": "uuidd-2.37.2-150400.8.38.1.ppc64le",
"product_id": "uuidd-2.37.2-150400.8.38.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "libblkid-devel-2.37.2-150400.8.38.1.s390x",
"product_id": "libblkid-devel-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "libblkid-devel-static-2.37.2-150400.8.38.1.s390x",
"product_id": "libblkid-devel-static-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "libblkid1-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "libblkid1-2.37.2-150400.8.38.1.s390x",
"product_id": "libblkid1-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "libfdisk-devel-2.37.2-150400.8.38.1.s390x",
"product_id": "libfdisk-devel-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "libfdisk-devel-static-2.37.2-150400.8.38.1.s390x",
"product_id": "libfdisk-devel-static-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "libfdisk1-2.37.2-150400.8.38.1.s390x",
"product_id": "libfdisk1-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "libmount-devel-2.37.2-150400.8.38.1.s390x",
"product_id": "libmount-devel-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "libmount-devel-static-2.37.2-150400.8.38.1.s390x",
"product_id": "libmount-devel-static-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount1-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "libmount1-2.37.2-150400.8.38.1.s390x",
"product_id": "libmount1-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "libsmartcols-devel-2.37.2-150400.8.38.1.s390x",
"product_id": "libsmartcols-devel-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "libsmartcols-devel-static-2.37.2-150400.8.38.1.s390x",
"product_id": "libsmartcols-devel-static-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "libsmartcols1-2.37.2-150400.8.38.1.s390x",
"product_id": "libsmartcols1-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "libuuid-devel-2.37.2-150400.8.38.1.s390x",
"product_id": "libuuid-devel-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "libuuid-devel-static-2.37.2-150400.8.38.1.s390x",
"product_id": "libuuid-devel-static-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid1-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "libuuid1-2.37.2-150400.8.38.1.s390x",
"product_id": "libuuid1-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "python3-libmount-2.37.2-150400.8.38.1.s390x",
"product_id": "python3-libmount-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "util-linux-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "util-linux-2.37.2-150400.8.38.1.s390x",
"product_id": "util-linux-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "util-linux-systemd-2.37.2-150400.8.38.1.s390x",
"product_id": "util-linux-systemd-2.37.2-150400.8.38.1.s390x"
}
},
{
"category": "product_version",
"name": "uuidd-2.37.2-150400.8.38.1.s390x",
"product": {
"name": "uuidd-2.37.2-150400.8.38.1.s390x",
"product_id": "uuidd-2.37.2-150400.8.38.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libblkid-devel-2.37.2-150400.8.38.1.x86_64",
"product_id": "libblkid-devel-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-32bit-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libblkid-devel-32bit-2.37.2-150400.8.38.1.x86_64",
"product_id": "libblkid-devel-32bit-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libblkid-devel-static-2.37.2-150400.8.38.1.x86_64",
"product_id": "libblkid-devel-static-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid1-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libblkid1-2.37.2-150400.8.38.1.x86_64",
"product_id": "libblkid1-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid1-32bit-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libblkid1-32bit-2.37.2-150400.8.38.1.x86_64",
"product_id": "libblkid1-32bit-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libfdisk-devel-2.37.2-150400.8.38.1.x86_64",
"product_id": "libfdisk-devel-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-32bit-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libfdisk-devel-32bit-2.37.2-150400.8.38.1.x86_64",
"product_id": "libfdisk-devel-32bit-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libfdisk-devel-static-2.37.2-150400.8.38.1.x86_64",
"product_id": "libfdisk-devel-static-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libfdisk1-2.37.2-150400.8.38.1.x86_64",
"product_id": "libfdisk1-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk1-32bit-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libfdisk1-32bit-2.37.2-150400.8.38.1.x86_64",
"product_id": "libfdisk1-32bit-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libmount-devel-2.37.2-150400.8.38.1.x86_64",
"product_id": "libmount-devel-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-32bit-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libmount-devel-32bit-2.37.2-150400.8.38.1.x86_64",
"product_id": "libmount-devel-32bit-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libmount-devel-static-2.37.2-150400.8.38.1.x86_64",
"product_id": "libmount-devel-static-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount1-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libmount1-2.37.2-150400.8.38.1.x86_64",
"product_id": "libmount1-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount1-32bit-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libmount1-32bit-2.37.2-150400.8.38.1.x86_64",
"product_id": "libmount1-32bit-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libsmartcols-devel-2.37.2-150400.8.38.1.x86_64",
"product_id": "libsmartcols-devel-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-32bit-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libsmartcols-devel-32bit-2.37.2-150400.8.38.1.x86_64",
"product_id": "libsmartcols-devel-32bit-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libsmartcols-devel-static-2.37.2-150400.8.38.1.x86_64",
"product_id": "libsmartcols-devel-static-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libsmartcols1-2.37.2-150400.8.38.1.x86_64",
"product_id": "libsmartcols1-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-32bit-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libsmartcols1-32bit-2.37.2-150400.8.38.1.x86_64",
"product_id": "libsmartcols1-32bit-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libuuid-devel-2.37.2-150400.8.38.1.x86_64",
"product_id": "libuuid-devel-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-32bit-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libuuid-devel-32bit-2.37.2-150400.8.38.1.x86_64",
"product_id": "libuuid-devel-32bit-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libuuid-devel-static-2.37.2-150400.8.38.1.x86_64",
"product_id": "libuuid-devel-static-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid1-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libuuid1-2.37.2-150400.8.38.1.x86_64",
"product_id": "libuuid1-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid1-32bit-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "libuuid1-32bit-2.37.2-150400.8.38.1.x86_64",
"product_id": "libuuid1-32bit-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "python3-libmount-2.37.2-150400.8.38.1.x86_64",
"product_id": "python3-libmount-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "util-linux-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "util-linux-2.37.2-150400.8.38.1.x86_64",
"product_id": "util-linux-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "util-linux-systemd-2.37.2-150400.8.38.1.x86_64",
"product_id": "util-linux-systemd-2.37.2-150400.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "uuidd-2.37.2-150400.8.38.1.x86_64",
"product": {
"name": "uuidd-2.37.2-150400.8.38.1.x86_64",
"product_id": "uuidd-2.37.2-150400.8.38.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.37.2-150400.8.38.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libblkid1-2.37.2-150400.8.38.1.aarch64"
},
"product_reference": "libblkid1-2.37.2-150400.8.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.37.2-150400.8.38.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libblkid1-2.37.2-150400.8.38.1.s390x"
},
"product_reference": "libblkid1-2.37.2-150400.8.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.37.2-150400.8.38.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libblkid1-2.37.2-150400.8.38.1.x86_64"
},
"product_reference": "libblkid1-2.37.2-150400.8.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.37.2-150400.8.38.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libfdisk1-2.37.2-150400.8.38.1.aarch64"
},
"product_reference": "libfdisk1-2.37.2-150400.8.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.37.2-150400.8.38.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libfdisk1-2.37.2-150400.8.38.1.s390x"
},
"product_reference": "libfdisk1-2.37.2-150400.8.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.37.2-150400.8.38.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libfdisk1-2.37.2-150400.8.38.1.x86_64"
},
"product_reference": "libfdisk1-2.37.2-150400.8.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.37.2-150400.8.38.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libmount1-2.37.2-150400.8.38.1.aarch64"
},
"product_reference": "libmount1-2.37.2-150400.8.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.37.2-150400.8.38.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libmount1-2.37.2-150400.8.38.1.s390x"
},
"product_reference": "libmount1-2.37.2-150400.8.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.37.2-150400.8.38.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libmount1-2.37.2-150400.8.38.1.x86_64"
},
"product_reference": "libmount1-2.37.2-150400.8.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.37.2-150400.8.38.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libsmartcols1-2.37.2-150400.8.38.1.aarch64"
},
"product_reference": "libsmartcols1-2.37.2-150400.8.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.37.2-150400.8.38.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libsmartcols1-2.37.2-150400.8.38.1.s390x"
},
"product_reference": "libsmartcols1-2.37.2-150400.8.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.37.2-150400.8.38.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libsmartcols1-2.37.2-150400.8.38.1.x86_64"
},
"product_reference": "libsmartcols1-2.37.2-150400.8.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.37.2-150400.8.38.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libuuid1-2.37.2-150400.8.38.1.aarch64"
},
"product_reference": "libuuid1-2.37.2-150400.8.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.37.2-150400.8.38.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libuuid1-2.37.2-150400.8.38.1.s390x"
},
"product_reference": "libuuid1-2.37.2-150400.8.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.37.2-150400.8.38.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libuuid1-2.37.2-150400.8.38.1.x86_64"
},
"product_reference": "libuuid1-2.37.2-150400.8.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.37.2-150400.8.38.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:util-linux-2.37.2-150400.8.38.1.aarch64"
},
"product_reference": "util-linux-2.37.2-150400.8.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.37.2-150400.8.38.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:util-linux-2.37.2-150400.8.38.1.s390x"
},
"product_reference": "util-linux-2.37.2-150400.8.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.37.2-150400.8.38.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:util-linux-2.37.2-150400.8.38.1.x86_64"
},
"product_reference": "util-linux-2.37.2-150400.8.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.37.2-150400.8.38.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:util-linux-systemd-2.37.2-150400.8.38.1.aarch64"
},
"product_reference": "util-linux-systemd-2.37.2-150400.8.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.37.2-150400.8.38.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:util-linux-systemd-2.37.2-150400.8.38.1.s390x"
},
"product_reference": "util-linux-systemd-2.37.2-150400.8.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.37.2-150400.8.38.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:util-linux-systemd-2.37.2-150400.8.38.1.x86_64"
},
"product_reference": "util-linux-systemd-2.37.2-150400.8.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.37.2-150400.8.38.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libblkid1-2.37.2-150400.8.38.1.aarch64"
},
"product_reference": "libblkid1-2.37.2-150400.8.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.37.2-150400.8.38.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libblkid1-2.37.2-150400.8.38.1.s390x"
},
"product_reference": "libblkid1-2.37.2-150400.8.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.37.2-150400.8.38.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libblkid1-2.37.2-150400.8.38.1.x86_64"
},
"product_reference": "libblkid1-2.37.2-150400.8.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.37.2-150400.8.38.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libfdisk1-2.37.2-150400.8.38.1.aarch64"
},
"product_reference": "libfdisk1-2.37.2-150400.8.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.37.2-150400.8.38.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libfdisk1-2.37.2-150400.8.38.1.s390x"
},
"product_reference": "libfdisk1-2.37.2-150400.8.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.37.2-150400.8.38.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libfdisk1-2.37.2-150400.8.38.1.x86_64"
},
"product_reference": "libfdisk1-2.37.2-150400.8.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.37.2-150400.8.38.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libmount1-2.37.2-150400.8.38.1.aarch64"
},
"product_reference": "libmount1-2.37.2-150400.8.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.37.2-150400.8.38.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libmount1-2.37.2-150400.8.38.1.s390x"
},
"product_reference": "libmount1-2.37.2-150400.8.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.37.2-150400.8.38.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libmount1-2.37.2-150400.8.38.1.x86_64"
},
"product_reference": "libmount1-2.37.2-150400.8.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.37.2-150400.8.38.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libsmartcols1-2.37.2-150400.8.38.1.aarch64"
},
"product_reference": "libsmartcols1-2.37.2-150400.8.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.37.2-150400.8.38.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libsmartcols1-2.37.2-150400.8.38.1.s390x"
},
"product_reference": "libsmartcols1-2.37.2-150400.8.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.37.2-150400.8.38.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libsmartcols1-2.37.2-150400.8.38.1.x86_64"
},
"product_reference": "libsmartcols1-2.37.2-150400.8.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.37.2-150400.8.38.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libuuid1-2.37.2-150400.8.38.1.aarch64"
},
"product_reference": "libuuid1-2.37.2-150400.8.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.37.2-150400.8.38.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libuuid1-2.37.2-150400.8.38.1.s390x"
},
"product_reference": "libuuid1-2.37.2-150400.8.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.37.2-150400.8.38.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libuuid1-2.37.2-150400.8.38.1.x86_64"
},
"product_reference": "libuuid1-2.37.2-150400.8.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.37.2-150400.8.38.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:util-linux-2.37.2-150400.8.38.1.aarch64"
},
"product_reference": "util-linux-2.37.2-150400.8.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.37.2-150400.8.38.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:util-linux-2.37.2-150400.8.38.1.s390x"
},
"product_reference": "util-linux-2.37.2-150400.8.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.37.2-150400.8.38.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:util-linux-2.37.2-150400.8.38.1.x86_64"
},
"product_reference": "util-linux-2.37.2-150400.8.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.37.2-150400.8.38.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:util-linux-systemd-2.37.2-150400.8.38.1.aarch64"
},
"product_reference": "util-linux-systemd-2.37.2-150400.8.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.37.2-150400.8.38.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:util-linux-systemd-2.37.2-150400.8.38.1.s390x"
},
"product_reference": "util-linux-systemd-2.37.2-150400.8.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.37.2-150400.8.38.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:util-linux-systemd-2.37.2-150400.8.38.1.x86_64"
},
"product_reference": "util-linux-systemd-2.37.2-150400.8.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14104"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:libblkid1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libblkid1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libblkid1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libfdisk1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libfdisk1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libfdisk1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libmount1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libmount1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libmount1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libsmartcols1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsmartcols1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsmartcols1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libuuid1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libuuid1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libuuid1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:util-linux-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:util-linux-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:util-linux-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:util-linux-systemd-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:util-linux-systemd-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:util-linux-systemd-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libblkid1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libblkid1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libblkid1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libfdisk1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libfdisk1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libfdisk1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libmount1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libmount1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libmount1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libsmartcols1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libsmartcols1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libsmartcols1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libuuid1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libuuid1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libuuid1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:util-linux-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:util-linux-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:util-linux-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:util-linux-systemd-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:util-linux-systemd-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:util-linux-systemd-2.37.2-150400.8.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14104",
"url": "https://www.suse.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "SUSE Bug 1254666 for CVE-2025-14104",
"url": "https://bugzilla.suse.com/1254666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:libblkid1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libblkid1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libblkid1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libfdisk1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libfdisk1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libfdisk1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libmount1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libmount1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libmount1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libsmartcols1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsmartcols1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsmartcols1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libuuid1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libuuid1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libuuid1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:util-linux-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:util-linux-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:util-linux-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:util-linux-systemd-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:util-linux-systemd-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:util-linux-systemd-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libblkid1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libblkid1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libblkid1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libfdisk1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libfdisk1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libfdisk1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libmount1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libmount1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libmount1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libsmartcols1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libsmartcols1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libsmartcols1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libuuid1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libuuid1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libuuid1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:util-linux-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:util-linux-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:util-linux-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:util-linux-systemd-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:util-linux-systemd-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:util-linux-systemd-2.37.2-150400.8.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:libblkid1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libblkid1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libblkid1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libfdisk1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libfdisk1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libfdisk1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libmount1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libmount1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libmount1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libsmartcols1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsmartcols1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsmartcols1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libuuid1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libuuid1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libuuid1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:util-linux-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:util-linux-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:util-linux-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:util-linux-systemd-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:util-linux-systemd-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.3:util-linux-systemd-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libblkid1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libblkid1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libblkid1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libfdisk1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libfdisk1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libfdisk1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libmount1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libmount1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libmount1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libsmartcols1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libsmartcols1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libsmartcols1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libuuid1-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libuuid1-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libuuid1-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:util-linux-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:util-linux-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:util-linux-2.37.2-150400.8.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:util-linux-systemd-2.37.2-150400.8.38.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:util-linux-systemd-2.37.2-150400.8.38.1.s390x",
"SUSE Linux Enterprise Micro 5.4:util-linux-systemd-2.37.2-150400.8.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-13T14:52:46Z",
"details": "moderate"
}
],
"title": "CVE-2025-14104"
}
]
}
SUSE-SU-2026:0116-1
Vulnerability from csaf_suse - Published: 2026-01-13 02:33 - Updated: 2026-01-13 02:33Summary
Security update for util-linux
Notes
Title of the patch
Security update for util-linux
Description of the patch
This update for util-linux fixes the following issues:
- CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666).
- lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682).
Patchnames
SUSE-2026-116,SUSE-SUSE-MicroOS-5.2-2026-116
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for util-linux",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for util-linux fixes the following issues:\n\n- CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666).\n- lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-116,SUSE-SUSE-MicroOS-5.2-2026-116",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0116-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0116-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260116-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0116-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023737.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254666",
"url": "https://bugzilla.suse.com/1254666"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14104 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14104/"
}
],
"title": "Security update for util-linux",
"tracking": {
"current_release_date": "2026-01-13T02:33:45Z",
"generator": {
"date": "2026-01-13T02:33:45Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0116-1",
"initial_release_date": "2026-01-13T02:33:45Z",
"revision_history": [
{
"date": "2026-01-13T02:33:45Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "libblkid-devel-2.36.2-150300.4.50.1.aarch64",
"product_id": "libblkid-devel-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "libblkid-devel-static-2.36.2-150300.4.50.1.aarch64",
"product_id": "libblkid-devel-static-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "libblkid1-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "libblkid1-2.36.2-150300.4.50.1.aarch64",
"product_id": "libblkid1-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "libfdisk-devel-2.36.2-150300.4.50.1.aarch64",
"product_id": "libfdisk-devel-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "libfdisk-devel-static-2.36.2-150300.4.50.1.aarch64",
"product_id": "libfdisk-devel-static-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "libfdisk1-2.36.2-150300.4.50.1.aarch64",
"product_id": "libfdisk1-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "libmount-devel-2.36.2-150300.4.50.1.aarch64",
"product_id": "libmount-devel-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "libmount-devel-static-2.36.2-150300.4.50.1.aarch64",
"product_id": "libmount-devel-static-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount1-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "libmount1-2.36.2-150300.4.50.1.aarch64",
"product_id": "libmount1-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "libsmartcols-devel-2.36.2-150300.4.50.1.aarch64",
"product_id": "libsmartcols-devel-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "libsmartcols-devel-static-2.36.2-150300.4.50.1.aarch64",
"product_id": "libsmartcols-devel-static-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "libsmartcols1-2.36.2-150300.4.50.1.aarch64",
"product_id": "libsmartcols1-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "libuuid-devel-2.36.2-150300.4.50.1.aarch64",
"product_id": "libuuid-devel-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "libuuid-devel-static-2.36.2-150300.4.50.1.aarch64",
"product_id": "libuuid-devel-static-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid1-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "libuuid1-2.36.2-150300.4.50.1.aarch64",
"product_id": "libuuid1-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "python3-libmount-2.36.2-150300.4.50.1.aarch64",
"product_id": "python3-libmount-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "util-linux-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "util-linux-2.36.2-150300.4.50.1.aarch64",
"product_id": "util-linux-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "util-linux-systemd-2.36.2-150300.4.50.1.aarch64",
"product_id": "util-linux-systemd-2.36.2-150300.4.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "uuidd-2.36.2-150300.4.50.1.aarch64",
"product": {
"name": "uuidd-2.36.2-150300.4.50.1.aarch64",
"product_id": "uuidd-2.36.2-150300.4.50.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product": {
"name": "libblkid-devel-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product_id": "libblkid-devel-64bit-2.36.2-150300.4.50.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libblkid1-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product": {
"name": "libblkid1-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product_id": "libblkid1-64bit-2.36.2-150300.4.50.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product": {
"name": "libfdisk-devel-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product_id": "libfdisk-devel-64bit-2.36.2-150300.4.50.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libfdisk1-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product": {
"name": "libfdisk1-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product_id": "libfdisk1-64bit-2.36.2-150300.4.50.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libmount-devel-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product": {
"name": "libmount-devel-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product_id": "libmount-devel-64bit-2.36.2-150300.4.50.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libmount1-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product": {
"name": "libmount1-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product_id": "libmount1-64bit-2.36.2-150300.4.50.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product": {
"name": "libsmartcols-devel-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product_id": "libsmartcols-devel-64bit-2.36.2-150300.4.50.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libsmartcols1-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product": {
"name": "libsmartcols1-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product_id": "libsmartcols1-64bit-2.36.2-150300.4.50.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libuuid-devel-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product": {
"name": "libuuid-devel-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product_id": "libuuid-devel-64bit-2.36.2-150300.4.50.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libuuid1-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product": {
"name": "libuuid1-64bit-2.36.2-150300.4.50.1.aarch64_ilp32",
"product_id": "libuuid1-64bit-2.36.2-150300.4.50.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.36.2-150300.4.50.1.i586",
"product": {
"name": "libblkid-devel-2.36.2-150300.4.50.1.i586",
"product_id": "libblkid-devel-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.36.2-150300.4.50.1.i586",
"product": {
"name": "libblkid-devel-static-2.36.2-150300.4.50.1.i586",
"product_id": "libblkid-devel-static-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "libblkid1-2.36.2-150300.4.50.1.i586",
"product": {
"name": "libblkid1-2.36.2-150300.4.50.1.i586",
"product_id": "libblkid1-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.36.2-150300.4.50.1.i586",
"product": {
"name": "libfdisk-devel-2.36.2-150300.4.50.1.i586",
"product_id": "libfdisk-devel-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.36.2-150300.4.50.1.i586",
"product": {
"name": "libfdisk-devel-static-2.36.2-150300.4.50.1.i586",
"product_id": "libfdisk-devel-static-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.36.2-150300.4.50.1.i586",
"product": {
"name": "libfdisk1-2.36.2-150300.4.50.1.i586",
"product_id": "libfdisk1-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.36.2-150300.4.50.1.i586",
"product": {
"name": "libmount-devel-2.36.2-150300.4.50.1.i586",
"product_id": "libmount-devel-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.36.2-150300.4.50.1.i586",
"product": {
"name": "libmount-devel-static-2.36.2-150300.4.50.1.i586",
"product_id": "libmount-devel-static-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "libmount1-2.36.2-150300.4.50.1.i586",
"product": {
"name": "libmount1-2.36.2-150300.4.50.1.i586",
"product_id": "libmount1-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.36.2-150300.4.50.1.i586",
"product": {
"name": "libsmartcols-devel-2.36.2-150300.4.50.1.i586",
"product_id": "libsmartcols-devel-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.36.2-150300.4.50.1.i586",
"product": {
"name": "libsmartcols-devel-static-2.36.2-150300.4.50.1.i586",
"product_id": "libsmartcols-devel-static-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.36.2-150300.4.50.1.i586",
"product": {
"name": "libsmartcols1-2.36.2-150300.4.50.1.i586",
"product_id": "libsmartcols1-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.36.2-150300.4.50.1.i586",
"product": {
"name": "libuuid-devel-2.36.2-150300.4.50.1.i586",
"product_id": "libuuid-devel-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.36.2-150300.4.50.1.i586",
"product": {
"name": "libuuid-devel-static-2.36.2-150300.4.50.1.i586",
"product_id": "libuuid-devel-static-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "libuuid1-2.36.2-150300.4.50.1.i586",
"product": {
"name": "libuuid1-2.36.2-150300.4.50.1.i586",
"product_id": "libuuid1-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.36.2-150300.4.50.1.i586",
"product": {
"name": "python3-libmount-2.36.2-150300.4.50.1.i586",
"product_id": "python3-libmount-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "util-linux-2.36.2-150300.4.50.1.i586",
"product": {
"name": "util-linux-2.36.2-150300.4.50.1.i586",
"product_id": "util-linux-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.36.2-150300.4.50.1.i586",
"product": {
"name": "util-linux-systemd-2.36.2-150300.4.50.1.i586",
"product_id": "util-linux-systemd-2.36.2-150300.4.50.1.i586"
}
},
{
"category": "product_version",
"name": "uuidd-2.36.2-150300.4.50.1.i586",
"product": {
"name": "uuidd-2.36.2-150300.4.50.1.i586",
"product_id": "uuidd-2.36.2-150300.4.50.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "util-linux-lang-2.36.2-150300.4.50.1.noarch",
"product": {
"name": "util-linux-lang-2.36.2-150300.4.50.1.noarch",
"product_id": "util-linux-lang-2.36.2-150300.4.50.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "libblkid-devel-2.36.2-150300.4.50.1.ppc64le",
"product_id": "libblkid-devel-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "libblkid-devel-static-2.36.2-150300.4.50.1.ppc64le",
"product_id": "libblkid-devel-static-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libblkid1-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "libblkid1-2.36.2-150300.4.50.1.ppc64le",
"product_id": "libblkid1-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "libfdisk-devel-2.36.2-150300.4.50.1.ppc64le",
"product_id": "libfdisk-devel-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "libfdisk-devel-static-2.36.2-150300.4.50.1.ppc64le",
"product_id": "libfdisk-devel-static-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "libfdisk1-2.36.2-150300.4.50.1.ppc64le",
"product_id": "libfdisk1-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "libmount-devel-2.36.2-150300.4.50.1.ppc64le",
"product_id": "libmount-devel-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "libmount-devel-static-2.36.2-150300.4.50.1.ppc64le",
"product_id": "libmount-devel-static-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount1-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "libmount1-2.36.2-150300.4.50.1.ppc64le",
"product_id": "libmount1-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "libsmartcols-devel-2.36.2-150300.4.50.1.ppc64le",
"product_id": "libsmartcols-devel-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "libsmartcols-devel-static-2.36.2-150300.4.50.1.ppc64le",
"product_id": "libsmartcols-devel-static-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "libsmartcols1-2.36.2-150300.4.50.1.ppc64le",
"product_id": "libsmartcols1-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "libuuid-devel-2.36.2-150300.4.50.1.ppc64le",
"product_id": "libuuid-devel-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "libuuid-devel-static-2.36.2-150300.4.50.1.ppc64le",
"product_id": "libuuid-devel-static-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid1-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "libuuid1-2.36.2-150300.4.50.1.ppc64le",
"product_id": "libuuid1-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "python3-libmount-2.36.2-150300.4.50.1.ppc64le",
"product_id": "python3-libmount-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "util-linux-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "util-linux-2.36.2-150300.4.50.1.ppc64le",
"product_id": "util-linux-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "util-linux-systemd-2.36.2-150300.4.50.1.ppc64le",
"product_id": "util-linux-systemd-2.36.2-150300.4.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uuidd-2.36.2-150300.4.50.1.ppc64le",
"product": {
"name": "uuidd-2.36.2-150300.4.50.1.ppc64le",
"product_id": "uuidd-2.36.2-150300.4.50.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "libblkid-devel-2.36.2-150300.4.50.1.s390x",
"product_id": "libblkid-devel-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "libblkid-devel-static-2.36.2-150300.4.50.1.s390x",
"product_id": "libblkid-devel-static-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "libblkid1-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "libblkid1-2.36.2-150300.4.50.1.s390x",
"product_id": "libblkid1-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "libfdisk-devel-2.36.2-150300.4.50.1.s390x",
"product_id": "libfdisk-devel-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "libfdisk-devel-static-2.36.2-150300.4.50.1.s390x",
"product_id": "libfdisk-devel-static-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "libfdisk1-2.36.2-150300.4.50.1.s390x",
"product_id": "libfdisk1-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "libmount-devel-2.36.2-150300.4.50.1.s390x",
"product_id": "libmount-devel-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "libmount-devel-static-2.36.2-150300.4.50.1.s390x",
"product_id": "libmount-devel-static-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount1-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "libmount1-2.36.2-150300.4.50.1.s390x",
"product_id": "libmount1-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "libsmartcols-devel-2.36.2-150300.4.50.1.s390x",
"product_id": "libsmartcols-devel-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "libsmartcols-devel-static-2.36.2-150300.4.50.1.s390x",
"product_id": "libsmartcols-devel-static-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "libsmartcols1-2.36.2-150300.4.50.1.s390x",
"product_id": "libsmartcols1-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "libuuid-devel-2.36.2-150300.4.50.1.s390x",
"product_id": "libuuid-devel-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "libuuid-devel-static-2.36.2-150300.4.50.1.s390x",
"product_id": "libuuid-devel-static-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid1-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "libuuid1-2.36.2-150300.4.50.1.s390x",
"product_id": "libuuid1-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "python3-libmount-2.36.2-150300.4.50.1.s390x",
"product_id": "python3-libmount-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "util-linux-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "util-linux-2.36.2-150300.4.50.1.s390x",
"product_id": "util-linux-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "util-linux-systemd-2.36.2-150300.4.50.1.s390x",
"product_id": "util-linux-systemd-2.36.2-150300.4.50.1.s390x"
}
},
{
"category": "product_version",
"name": "uuidd-2.36.2-150300.4.50.1.s390x",
"product": {
"name": "uuidd-2.36.2-150300.4.50.1.s390x",
"product_id": "uuidd-2.36.2-150300.4.50.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libblkid-devel-2.36.2-150300.4.50.1.x86_64",
"product_id": "libblkid-devel-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-32bit-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libblkid-devel-32bit-2.36.2-150300.4.50.1.x86_64",
"product_id": "libblkid-devel-32bit-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libblkid-devel-static-2.36.2-150300.4.50.1.x86_64",
"product_id": "libblkid-devel-static-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid1-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libblkid1-2.36.2-150300.4.50.1.x86_64",
"product_id": "libblkid1-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid1-32bit-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libblkid1-32bit-2.36.2-150300.4.50.1.x86_64",
"product_id": "libblkid1-32bit-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libfdisk-devel-2.36.2-150300.4.50.1.x86_64",
"product_id": "libfdisk-devel-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-32bit-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libfdisk-devel-32bit-2.36.2-150300.4.50.1.x86_64",
"product_id": "libfdisk-devel-32bit-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libfdisk-devel-static-2.36.2-150300.4.50.1.x86_64",
"product_id": "libfdisk-devel-static-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libfdisk1-2.36.2-150300.4.50.1.x86_64",
"product_id": "libfdisk1-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk1-32bit-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libfdisk1-32bit-2.36.2-150300.4.50.1.x86_64",
"product_id": "libfdisk1-32bit-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libmount-devel-2.36.2-150300.4.50.1.x86_64",
"product_id": "libmount-devel-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-32bit-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libmount-devel-32bit-2.36.2-150300.4.50.1.x86_64",
"product_id": "libmount-devel-32bit-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libmount-devel-static-2.36.2-150300.4.50.1.x86_64",
"product_id": "libmount-devel-static-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount1-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libmount1-2.36.2-150300.4.50.1.x86_64",
"product_id": "libmount1-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount1-32bit-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libmount1-32bit-2.36.2-150300.4.50.1.x86_64",
"product_id": "libmount1-32bit-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libsmartcols-devel-2.36.2-150300.4.50.1.x86_64",
"product_id": "libsmartcols-devel-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-32bit-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libsmartcols-devel-32bit-2.36.2-150300.4.50.1.x86_64",
"product_id": "libsmartcols-devel-32bit-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libsmartcols-devel-static-2.36.2-150300.4.50.1.x86_64",
"product_id": "libsmartcols-devel-static-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libsmartcols1-2.36.2-150300.4.50.1.x86_64",
"product_id": "libsmartcols1-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-32bit-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libsmartcols1-32bit-2.36.2-150300.4.50.1.x86_64",
"product_id": "libsmartcols1-32bit-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libuuid-devel-2.36.2-150300.4.50.1.x86_64",
"product_id": "libuuid-devel-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-32bit-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libuuid-devel-32bit-2.36.2-150300.4.50.1.x86_64",
"product_id": "libuuid-devel-32bit-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libuuid-devel-static-2.36.2-150300.4.50.1.x86_64",
"product_id": "libuuid-devel-static-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid1-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libuuid1-2.36.2-150300.4.50.1.x86_64",
"product_id": "libuuid1-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid1-32bit-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "libuuid1-32bit-2.36.2-150300.4.50.1.x86_64",
"product_id": "libuuid1-32bit-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "python3-libmount-2.36.2-150300.4.50.1.x86_64",
"product_id": "python3-libmount-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "util-linux-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "util-linux-2.36.2-150300.4.50.1.x86_64",
"product_id": "util-linux-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "util-linux-systemd-2.36.2-150300.4.50.1.x86_64",
"product_id": "util-linux-systemd-2.36.2-150300.4.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "uuidd-2.36.2-150300.4.50.1.x86_64",
"product": {
"name": "uuidd-2.36.2-150300.4.50.1.x86_64",
"product_id": "uuidd-2.36.2-150300.4.50.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.36.2-150300.4.50.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libblkid1-2.36.2-150300.4.50.1.aarch64"
},
"product_reference": "libblkid1-2.36.2-150300.4.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.36.2-150300.4.50.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libblkid1-2.36.2-150300.4.50.1.s390x"
},
"product_reference": "libblkid1-2.36.2-150300.4.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.36.2-150300.4.50.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libblkid1-2.36.2-150300.4.50.1.x86_64"
},
"product_reference": "libblkid1-2.36.2-150300.4.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.36.2-150300.4.50.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libfdisk1-2.36.2-150300.4.50.1.aarch64"
},
"product_reference": "libfdisk1-2.36.2-150300.4.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.36.2-150300.4.50.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libfdisk1-2.36.2-150300.4.50.1.s390x"
},
"product_reference": "libfdisk1-2.36.2-150300.4.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.36.2-150300.4.50.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libfdisk1-2.36.2-150300.4.50.1.x86_64"
},
"product_reference": "libfdisk1-2.36.2-150300.4.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.36.2-150300.4.50.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libmount1-2.36.2-150300.4.50.1.aarch64"
},
"product_reference": "libmount1-2.36.2-150300.4.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.36.2-150300.4.50.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libmount1-2.36.2-150300.4.50.1.s390x"
},
"product_reference": "libmount1-2.36.2-150300.4.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.36.2-150300.4.50.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libmount1-2.36.2-150300.4.50.1.x86_64"
},
"product_reference": "libmount1-2.36.2-150300.4.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.36.2-150300.4.50.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libsmartcols1-2.36.2-150300.4.50.1.aarch64"
},
"product_reference": "libsmartcols1-2.36.2-150300.4.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.36.2-150300.4.50.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libsmartcols1-2.36.2-150300.4.50.1.s390x"
},
"product_reference": "libsmartcols1-2.36.2-150300.4.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.36.2-150300.4.50.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libsmartcols1-2.36.2-150300.4.50.1.x86_64"
},
"product_reference": "libsmartcols1-2.36.2-150300.4.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.36.2-150300.4.50.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libuuid1-2.36.2-150300.4.50.1.aarch64"
},
"product_reference": "libuuid1-2.36.2-150300.4.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.36.2-150300.4.50.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libuuid1-2.36.2-150300.4.50.1.s390x"
},
"product_reference": "libuuid1-2.36.2-150300.4.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.36.2-150300.4.50.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libuuid1-2.36.2-150300.4.50.1.x86_64"
},
"product_reference": "libuuid1-2.36.2-150300.4.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.36.2-150300.4.50.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:util-linux-2.36.2-150300.4.50.1.aarch64"
},
"product_reference": "util-linux-2.36.2-150300.4.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.36.2-150300.4.50.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:util-linux-2.36.2-150300.4.50.1.s390x"
},
"product_reference": "util-linux-2.36.2-150300.4.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.36.2-150300.4.50.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:util-linux-2.36.2-150300.4.50.1.x86_64"
},
"product_reference": "util-linux-2.36.2-150300.4.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.36.2-150300.4.50.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:util-linux-systemd-2.36.2-150300.4.50.1.aarch64"
},
"product_reference": "util-linux-systemd-2.36.2-150300.4.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.36.2-150300.4.50.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:util-linux-systemd-2.36.2-150300.4.50.1.s390x"
},
"product_reference": "util-linux-systemd-2.36.2-150300.4.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.36.2-150300.4.50.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:util-linux-systemd-2.36.2-150300.4.50.1.x86_64"
},
"product_reference": "util-linux-systemd-2.36.2-150300.4.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14104"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libblkid1-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libblkid1-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libblkid1-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libfdisk1-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libfdisk1-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libfdisk1-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libmount1-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libmount1-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libmount1-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libsmartcols1-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libsmartcols1-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libsmartcols1-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libuuid1-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libuuid1-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libuuid1-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:util-linux-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:util-linux-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:util-linux-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:util-linux-systemd-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:util-linux-systemd-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:util-linux-systemd-2.36.2-150300.4.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14104",
"url": "https://www.suse.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "SUSE Bug 1254666 for CVE-2025-14104",
"url": "https://bugzilla.suse.com/1254666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libblkid1-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libblkid1-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libblkid1-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libfdisk1-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libfdisk1-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libfdisk1-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libmount1-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libmount1-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libmount1-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libsmartcols1-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libsmartcols1-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libsmartcols1-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libuuid1-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libuuid1-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libuuid1-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:util-linux-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:util-linux-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:util-linux-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:util-linux-systemd-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:util-linux-systemd-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:util-linux-systemd-2.36.2-150300.4.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libblkid1-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libblkid1-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libblkid1-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libfdisk1-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libfdisk1-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libfdisk1-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libmount1-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libmount1-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libmount1-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libsmartcols1-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libsmartcols1-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libsmartcols1-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libuuid1-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libuuid1-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libuuid1-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:util-linux-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:util-linux-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:util-linux-2.36.2-150300.4.50.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:util-linux-systemd-2.36.2-150300.4.50.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:util-linux-systemd-2.36.2-150300.4.50.1.s390x",
"SUSE Linux Enterprise Micro 5.2:util-linux-systemd-2.36.2-150300.4.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-13T02:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-14104"
}
]
}
SUSE-SU-2026:0230-1
Vulnerability from csaf_suse - Published: 2026-01-22 12:22 - Updated: 2026-01-22 12:22Summary
Security update for util-linux
Notes
Title of the patch
Security update for util-linux
Description of the patch
This update for util-linux fixes the following issues:
- CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666).
- lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682).
Patchnames
SUSE-2026-230,SUSE-SLE-Module-Basesystem-15-SP7-2026-230,SUSE-SLE-Module-Server-Applications-15-SP7-2026-230
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for util-linux",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for util-linux fixes the following issues:\n\n- CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666).\n- lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-230,SUSE-SLE-Module-Basesystem-15-SP7-2026-230,SUSE-SLE-Module-Server-Applications-15-SP7-2026-230",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0230-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0230-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260230-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0230-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023855.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254666",
"url": "https://bugzilla.suse.com/1254666"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14104 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14104/"
}
],
"title": "Security update for util-linux",
"tracking": {
"current_release_date": "2026-01-22T12:22:40Z",
"generator": {
"date": "2026-01-22T12:22:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0230-1",
"initial_release_date": "2026-01-22T12:22:40Z",
"revision_history": [
{
"date": "2026-01-22T12:22:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "libblkid-devel-2.40.4-150700.4.3.1.aarch64",
"product_id": "libblkid-devel-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "libblkid-devel-static-2.40.4-150700.4.3.1.aarch64",
"product_id": "libblkid-devel-static-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libblkid1-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "libblkid1-2.40.4-150700.4.3.1.aarch64",
"product_id": "libblkid1-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "libfdisk-devel-2.40.4-150700.4.3.1.aarch64",
"product_id": "libfdisk-devel-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "libfdisk-devel-static-2.40.4-150700.4.3.1.aarch64",
"product_id": "libfdisk-devel-static-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "libfdisk1-2.40.4-150700.4.3.1.aarch64",
"product_id": "libfdisk1-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "libmount-devel-2.40.4-150700.4.3.1.aarch64",
"product_id": "libmount-devel-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "libmount-devel-static-2.40.4-150700.4.3.1.aarch64",
"product_id": "libmount-devel-static-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount1-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "libmount1-2.40.4-150700.4.3.1.aarch64",
"product_id": "libmount1-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "libsmartcols-devel-2.40.4-150700.4.3.1.aarch64",
"product_id": "libsmartcols-devel-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "libsmartcols-devel-static-2.40.4-150700.4.3.1.aarch64",
"product_id": "libsmartcols-devel-static-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "libsmartcols1-2.40.4-150700.4.3.1.aarch64",
"product_id": "libsmartcols1-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "libuuid-devel-2.40.4-150700.4.3.1.aarch64",
"product_id": "libuuid-devel-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "libuuid-devel-static-2.40.4-150700.4.3.1.aarch64",
"product_id": "libuuid-devel-static-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid1-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "libuuid1-2.40.4-150700.4.3.1.aarch64",
"product_id": "libuuid1-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "python3-libmount-2.40.4-150700.4.3.1.aarch64",
"product_id": "python3-libmount-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "util-linux-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "util-linux-2.40.4-150700.4.3.1.aarch64",
"product_id": "util-linux-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "util-linux-systemd-2.40.4-150700.4.3.1.aarch64",
"product_id": "util-linux-systemd-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "util-linux-tty-tools-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "util-linux-tty-tools-2.40.4-150700.4.3.1.aarch64",
"product_id": "util-linux-tty-tools-2.40.4-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uuidd-2.40.4-150700.4.3.1.aarch64",
"product": {
"name": "uuidd-2.40.4-150700.4.3.1.aarch64",
"product_id": "uuidd-2.40.4-150700.4.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product": {
"name": "libblkid-devel-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product_id": "libblkid-devel-64bit-2.40.4-150700.4.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libblkid1-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product": {
"name": "libblkid1-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product_id": "libblkid1-64bit-2.40.4-150700.4.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product": {
"name": "libfdisk-devel-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product_id": "libfdisk-devel-64bit-2.40.4-150700.4.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libfdisk1-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product": {
"name": "libfdisk1-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product_id": "libfdisk1-64bit-2.40.4-150700.4.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libmount-devel-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product": {
"name": "libmount-devel-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product_id": "libmount-devel-64bit-2.40.4-150700.4.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libmount1-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product": {
"name": "libmount1-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product_id": "libmount1-64bit-2.40.4-150700.4.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product": {
"name": "libsmartcols-devel-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product_id": "libsmartcols-devel-64bit-2.40.4-150700.4.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libsmartcols1-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product": {
"name": "libsmartcols1-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product_id": "libsmartcols1-64bit-2.40.4-150700.4.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libuuid-devel-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product": {
"name": "libuuid-devel-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product_id": "libuuid-devel-64bit-2.40.4-150700.4.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libuuid1-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product": {
"name": "libuuid1-64bit-2.40.4-150700.4.3.1.aarch64_ilp32",
"product_id": "libuuid1-64bit-2.40.4-150700.4.3.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.40.4-150700.4.3.1.i586",
"product": {
"name": "libblkid-devel-2.40.4-150700.4.3.1.i586",
"product_id": "libblkid-devel-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.40.4-150700.4.3.1.i586",
"product": {
"name": "libblkid-devel-static-2.40.4-150700.4.3.1.i586",
"product_id": "libblkid-devel-static-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libblkid1-2.40.4-150700.4.3.1.i586",
"product": {
"name": "libblkid1-2.40.4-150700.4.3.1.i586",
"product_id": "libblkid1-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.40.4-150700.4.3.1.i586",
"product": {
"name": "libfdisk-devel-2.40.4-150700.4.3.1.i586",
"product_id": "libfdisk-devel-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.40.4-150700.4.3.1.i586",
"product": {
"name": "libfdisk-devel-static-2.40.4-150700.4.3.1.i586",
"product_id": "libfdisk-devel-static-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.40.4-150700.4.3.1.i586",
"product": {
"name": "libfdisk1-2.40.4-150700.4.3.1.i586",
"product_id": "libfdisk1-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.40.4-150700.4.3.1.i586",
"product": {
"name": "libmount-devel-2.40.4-150700.4.3.1.i586",
"product_id": "libmount-devel-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.40.4-150700.4.3.1.i586",
"product": {
"name": "libmount-devel-static-2.40.4-150700.4.3.1.i586",
"product_id": "libmount-devel-static-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libmount1-2.40.4-150700.4.3.1.i586",
"product": {
"name": "libmount1-2.40.4-150700.4.3.1.i586",
"product_id": "libmount1-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.40.4-150700.4.3.1.i586",
"product": {
"name": "libsmartcols-devel-2.40.4-150700.4.3.1.i586",
"product_id": "libsmartcols-devel-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.40.4-150700.4.3.1.i586",
"product": {
"name": "libsmartcols-devel-static-2.40.4-150700.4.3.1.i586",
"product_id": "libsmartcols-devel-static-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.40.4-150700.4.3.1.i586",
"product": {
"name": "libsmartcols1-2.40.4-150700.4.3.1.i586",
"product_id": "libsmartcols1-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.40.4-150700.4.3.1.i586",
"product": {
"name": "libuuid-devel-2.40.4-150700.4.3.1.i586",
"product_id": "libuuid-devel-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.40.4-150700.4.3.1.i586",
"product": {
"name": "libuuid-devel-static-2.40.4-150700.4.3.1.i586",
"product_id": "libuuid-devel-static-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libuuid1-2.40.4-150700.4.3.1.i586",
"product": {
"name": "libuuid1-2.40.4-150700.4.3.1.i586",
"product_id": "libuuid1-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.40.4-150700.4.3.1.i586",
"product": {
"name": "python3-libmount-2.40.4-150700.4.3.1.i586",
"product_id": "python3-libmount-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "util-linux-2.40.4-150700.4.3.1.i586",
"product": {
"name": "util-linux-2.40.4-150700.4.3.1.i586",
"product_id": "util-linux-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.40.4-150700.4.3.1.i586",
"product": {
"name": "util-linux-systemd-2.40.4-150700.4.3.1.i586",
"product_id": "util-linux-systemd-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "util-linux-tty-tools-2.40.4-150700.4.3.1.i586",
"product": {
"name": "util-linux-tty-tools-2.40.4-150700.4.3.1.i586",
"product_id": "util-linux-tty-tools-2.40.4-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "uuidd-2.40.4-150700.4.3.1.i586",
"product": {
"name": "uuidd-2.40.4-150700.4.3.1.i586",
"product_id": "uuidd-2.40.4-150700.4.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "util-linux-lang-2.40.4-150700.4.3.1.noarch",
"product": {
"name": "util-linux-lang-2.40.4-150700.4.3.1.noarch",
"product_id": "util-linux-lang-2.40.4-150700.4.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "libblkid-devel-2.40.4-150700.4.3.1.ppc64le",
"product_id": "libblkid-devel-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "libblkid-devel-static-2.40.4-150700.4.3.1.ppc64le",
"product_id": "libblkid-devel-static-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libblkid1-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "libblkid1-2.40.4-150700.4.3.1.ppc64le",
"product_id": "libblkid1-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "libfdisk-devel-2.40.4-150700.4.3.1.ppc64le",
"product_id": "libfdisk-devel-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "libfdisk-devel-static-2.40.4-150700.4.3.1.ppc64le",
"product_id": "libfdisk-devel-static-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "libfdisk1-2.40.4-150700.4.3.1.ppc64le",
"product_id": "libfdisk1-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "libmount-devel-2.40.4-150700.4.3.1.ppc64le",
"product_id": "libmount-devel-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "libmount-devel-static-2.40.4-150700.4.3.1.ppc64le",
"product_id": "libmount-devel-static-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount1-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "libmount1-2.40.4-150700.4.3.1.ppc64le",
"product_id": "libmount1-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "libsmartcols-devel-2.40.4-150700.4.3.1.ppc64le",
"product_id": "libsmartcols-devel-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "libsmartcols-devel-static-2.40.4-150700.4.3.1.ppc64le",
"product_id": "libsmartcols-devel-static-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "libsmartcols1-2.40.4-150700.4.3.1.ppc64le",
"product_id": "libsmartcols1-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "libuuid-devel-2.40.4-150700.4.3.1.ppc64le",
"product_id": "libuuid-devel-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "libuuid-devel-static-2.40.4-150700.4.3.1.ppc64le",
"product_id": "libuuid-devel-static-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid1-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "libuuid1-2.40.4-150700.4.3.1.ppc64le",
"product_id": "libuuid1-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "python3-libmount-2.40.4-150700.4.3.1.ppc64le",
"product_id": "python3-libmount-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "util-linux-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "util-linux-2.40.4-150700.4.3.1.ppc64le",
"product_id": "util-linux-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "util-linux-systemd-2.40.4-150700.4.3.1.ppc64le",
"product_id": "util-linux-systemd-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "util-linux-tty-tools-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "util-linux-tty-tools-2.40.4-150700.4.3.1.ppc64le",
"product_id": "util-linux-tty-tools-2.40.4-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uuidd-2.40.4-150700.4.3.1.ppc64le",
"product": {
"name": "uuidd-2.40.4-150700.4.3.1.ppc64le",
"product_id": "uuidd-2.40.4-150700.4.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "libblkid-devel-2.40.4-150700.4.3.1.s390x",
"product_id": "libblkid-devel-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "libblkid-devel-static-2.40.4-150700.4.3.1.s390x",
"product_id": "libblkid-devel-static-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libblkid1-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "libblkid1-2.40.4-150700.4.3.1.s390x",
"product_id": "libblkid1-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "libfdisk-devel-2.40.4-150700.4.3.1.s390x",
"product_id": "libfdisk-devel-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "libfdisk-devel-static-2.40.4-150700.4.3.1.s390x",
"product_id": "libfdisk-devel-static-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "libfdisk1-2.40.4-150700.4.3.1.s390x",
"product_id": "libfdisk1-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "libmount-devel-2.40.4-150700.4.3.1.s390x",
"product_id": "libmount-devel-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "libmount-devel-static-2.40.4-150700.4.3.1.s390x",
"product_id": "libmount-devel-static-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount1-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "libmount1-2.40.4-150700.4.3.1.s390x",
"product_id": "libmount1-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "libsmartcols-devel-2.40.4-150700.4.3.1.s390x",
"product_id": "libsmartcols-devel-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "libsmartcols-devel-static-2.40.4-150700.4.3.1.s390x",
"product_id": "libsmartcols-devel-static-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "libsmartcols1-2.40.4-150700.4.3.1.s390x",
"product_id": "libsmartcols1-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "libuuid-devel-2.40.4-150700.4.3.1.s390x",
"product_id": "libuuid-devel-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "libuuid-devel-static-2.40.4-150700.4.3.1.s390x",
"product_id": "libuuid-devel-static-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid1-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "libuuid1-2.40.4-150700.4.3.1.s390x",
"product_id": "libuuid1-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "python3-libmount-2.40.4-150700.4.3.1.s390x",
"product_id": "python3-libmount-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "util-linux-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "util-linux-2.40.4-150700.4.3.1.s390x",
"product_id": "util-linux-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "util-linux-extra-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "util-linux-extra-2.40.4-150700.4.3.1.s390x",
"product_id": "util-linux-extra-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "util-linux-systemd-2.40.4-150700.4.3.1.s390x",
"product_id": "util-linux-systemd-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "util-linux-tty-tools-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "util-linux-tty-tools-2.40.4-150700.4.3.1.s390x",
"product_id": "util-linux-tty-tools-2.40.4-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uuidd-2.40.4-150700.4.3.1.s390x",
"product": {
"name": "uuidd-2.40.4-150700.4.3.1.s390x",
"product_id": "uuidd-2.40.4-150700.4.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libblkid-devel-2.40.4-150700.4.3.1.x86_64",
"product_id": "libblkid-devel-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-32bit-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libblkid-devel-32bit-2.40.4-150700.4.3.1.x86_64",
"product_id": "libblkid-devel-32bit-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libblkid-devel-static-2.40.4-150700.4.3.1.x86_64",
"product_id": "libblkid-devel-static-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid1-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libblkid1-2.40.4-150700.4.3.1.x86_64",
"product_id": "libblkid1-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid1-32bit-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libblkid1-32bit-2.40.4-150700.4.3.1.x86_64",
"product_id": "libblkid1-32bit-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libfdisk-devel-2.40.4-150700.4.3.1.x86_64",
"product_id": "libfdisk-devel-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-32bit-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libfdisk-devel-32bit-2.40.4-150700.4.3.1.x86_64",
"product_id": "libfdisk-devel-32bit-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libfdisk-devel-static-2.40.4-150700.4.3.1.x86_64",
"product_id": "libfdisk-devel-static-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libfdisk1-2.40.4-150700.4.3.1.x86_64",
"product_id": "libfdisk1-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk1-32bit-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libfdisk1-32bit-2.40.4-150700.4.3.1.x86_64",
"product_id": "libfdisk1-32bit-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libmount-devel-2.40.4-150700.4.3.1.x86_64",
"product_id": "libmount-devel-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-32bit-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libmount-devel-32bit-2.40.4-150700.4.3.1.x86_64",
"product_id": "libmount-devel-32bit-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libmount-devel-static-2.40.4-150700.4.3.1.x86_64",
"product_id": "libmount-devel-static-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount1-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libmount1-2.40.4-150700.4.3.1.x86_64",
"product_id": "libmount1-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount1-32bit-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libmount1-32bit-2.40.4-150700.4.3.1.x86_64",
"product_id": "libmount1-32bit-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libsmartcols-devel-2.40.4-150700.4.3.1.x86_64",
"product_id": "libsmartcols-devel-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-32bit-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libsmartcols-devel-32bit-2.40.4-150700.4.3.1.x86_64",
"product_id": "libsmartcols-devel-32bit-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libsmartcols-devel-static-2.40.4-150700.4.3.1.x86_64",
"product_id": "libsmartcols-devel-static-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libsmartcols1-2.40.4-150700.4.3.1.x86_64",
"product_id": "libsmartcols1-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-32bit-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libsmartcols1-32bit-2.40.4-150700.4.3.1.x86_64",
"product_id": "libsmartcols1-32bit-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libuuid-devel-2.40.4-150700.4.3.1.x86_64",
"product_id": "libuuid-devel-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-32bit-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libuuid-devel-32bit-2.40.4-150700.4.3.1.x86_64",
"product_id": "libuuid-devel-32bit-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libuuid-devel-static-2.40.4-150700.4.3.1.x86_64",
"product_id": "libuuid-devel-static-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid1-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libuuid1-2.40.4-150700.4.3.1.x86_64",
"product_id": "libuuid1-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid1-32bit-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "libuuid1-32bit-2.40.4-150700.4.3.1.x86_64",
"product_id": "libuuid1-32bit-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "python3-libmount-2.40.4-150700.4.3.1.x86_64",
"product_id": "python3-libmount-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "util-linux-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "util-linux-2.40.4-150700.4.3.1.x86_64",
"product_id": "util-linux-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "util-linux-systemd-2.40.4-150700.4.3.1.x86_64",
"product_id": "util-linux-systemd-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "util-linux-tty-tools-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "util-linux-tty-tools-2.40.4-150700.4.3.1.x86_64",
"product_id": "util-linux-tty-tools-2.40.4-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uuidd-2.40.4-150700.4.3.1.x86_64",
"product": {
"name": "uuidd-2.40.4-150700.4.3.1.x86_64",
"product_id": "uuidd-2.40.4-150700.4.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-2.40.4-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-2.40.4-150700.4.3.1.aarch64"
},
"product_reference": "libblkid-devel-2.40.4-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-2.40.4-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-2.40.4-150700.4.3.1.ppc64le"
},
"product_reference": "libblkid-devel-2.40.4-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-2.40.4-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-2.40.4-150700.4.3.1.s390x"
},
"product_reference": "libblkid-devel-2.40.4-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "libblkid-devel-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-static-2.40.4-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-static-2.40.4-150700.4.3.1.aarch64"
},
"product_reference": "libblkid-devel-static-2.40.4-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-static-2.40.4-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-static-2.40.4-150700.4.3.1.ppc64le"
},
"product_reference": "libblkid-devel-static-2.40.4-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-static-2.40.4-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-static-2.40.4-150700.4.3.1.s390x"
},
"product_reference": "libblkid-devel-static-2.40.4-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-static-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-static-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "libblkid-devel-static-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.40.4-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-2.40.4-150700.4.3.1.aarch64"
},
"product_reference": "libblkid1-2.40.4-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.40.4-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-2.40.4-150700.4.3.1.ppc64le"
},
"product_reference": "libblkid1-2.40.4-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.40.4-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-2.40.4-150700.4.3.1.s390x"
},
"product_reference": "libblkid1-2.40.4-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "libblkid1-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-32bit-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-32bit-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "libblkid1-32bit-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-2.40.4-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk-devel-2.40.4-150700.4.3.1.aarch64"
},
"product_reference": "libfdisk-devel-2.40.4-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-2.40.4-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk-devel-2.40.4-150700.4.3.1.ppc64le"
},
"product_reference": "libfdisk-devel-2.40.4-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-2.40.4-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk-devel-2.40.4-150700.4.3.1.s390x"
},
"product_reference": "libfdisk-devel-2.40.4-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk-devel-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "libfdisk-devel-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.40.4-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk1-2.40.4-150700.4.3.1.aarch64"
},
"product_reference": "libfdisk1-2.40.4-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.40.4-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk1-2.40.4-150700.4.3.1.ppc64le"
},
"product_reference": "libfdisk1-2.40.4-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.40.4-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk1-2.40.4-150700.4.3.1.s390x"
},
"product_reference": "libfdisk1-2.40.4-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk1-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "libfdisk1-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-2.40.4-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount-devel-2.40.4-150700.4.3.1.aarch64"
},
"product_reference": "libmount-devel-2.40.4-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-2.40.4-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount-devel-2.40.4-150700.4.3.1.ppc64le"
},
"product_reference": "libmount-devel-2.40.4-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-2.40.4-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount-devel-2.40.4-150700.4.3.1.s390x"
},
"product_reference": "libmount-devel-2.40.4-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount-devel-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "libmount-devel-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.40.4-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-2.40.4-150700.4.3.1.aarch64"
},
"product_reference": "libmount1-2.40.4-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.40.4-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-2.40.4-150700.4.3.1.ppc64le"
},
"product_reference": "libmount1-2.40.4-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.40.4-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-2.40.4-150700.4.3.1.s390x"
},
"product_reference": "libmount1-2.40.4-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "libmount1-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-32bit-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-32bit-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "libmount1-32bit-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-2.40.4-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols-devel-2.40.4-150700.4.3.1.aarch64"
},
"product_reference": "libsmartcols-devel-2.40.4-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-2.40.4-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols-devel-2.40.4-150700.4.3.1.ppc64le"
},
"product_reference": "libsmartcols-devel-2.40.4-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-2.40.4-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols-devel-2.40.4-150700.4.3.1.s390x"
},
"product_reference": "libsmartcols-devel-2.40.4-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols-devel-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "libsmartcols-devel-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.40.4-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols1-2.40.4-150700.4.3.1.aarch64"
},
"product_reference": "libsmartcols1-2.40.4-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.40.4-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols1-2.40.4-150700.4.3.1.ppc64le"
},
"product_reference": "libsmartcols1-2.40.4-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.40.4-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols1-2.40.4-150700.4.3.1.s390x"
},
"product_reference": "libsmartcols1-2.40.4-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols1-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "libsmartcols1-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-2.40.4-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-2.40.4-150700.4.3.1.aarch64"
},
"product_reference": "libuuid-devel-2.40.4-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-2.40.4-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-2.40.4-150700.4.3.1.ppc64le"
},
"product_reference": "libuuid-devel-2.40.4-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-2.40.4-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-2.40.4-150700.4.3.1.s390x"
},
"product_reference": "libuuid-devel-2.40.4-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "libuuid-devel-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-static-2.40.4-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-static-2.40.4-150700.4.3.1.aarch64"
},
"product_reference": "libuuid-devel-static-2.40.4-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-static-2.40.4-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-static-2.40.4-150700.4.3.1.ppc64le"
},
"product_reference": "libuuid-devel-static-2.40.4-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-static-2.40.4-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-static-2.40.4-150700.4.3.1.s390x"
},
"product_reference": "libuuid-devel-static-2.40.4-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-static-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-static-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "libuuid-devel-static-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.40.4-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-2.40.4-150700.4.3.1.aarch64"
},
"product_reference": "libuuid1-2.40.4-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.40.4-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-2.40.4-150700.4.3.1.ppc64le"
},
"product_reference": "libuuid1-2.40.4-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.40.4-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-2.40.4-150700.4.3.1.s390x"
},
"product_reference": "libuuid1-2.40.4-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "libuuid1-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-32bit-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-32bit-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "libuuid1-32bit-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.40.4-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-2.40.4-150700.4.3.1.aarch64"
},
"product_reference": "util-linux-2.40.4-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.40.4-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-2.40.4-150700.4.3.1.ppc64le"
},
"product_reference": "util-linux-2.40.4-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.40.4-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-2.40.4-150700.4.3.1.s390x"
},
"product_reference": "util-linux-2.40.4-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "util-linux-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-extra-2.40.4-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-extra-2.40.4-150700.4.3.1.s390x"
},
"product_reference": "util-linux-extra-2.40.4-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-lang-2.40.4-150700.4.3.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-lang-2.40.4-150700.4.3.1.noarch"
},
"product_reference": "util-linux-lang-2.40.4-150700.4.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.40.4-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-systemd-2.40.4-150700.4.3.1.aarch64"
},
"product_reference": "util-linux-systemd-2.40.4-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.40.4-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-systemd-2.40.4-150700.4.3.1.ppc64le"
},
"product_reference": "util-linux-systemd-2.40.4-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.40.4-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-systemd-2.40.4-150700.4.3.1.s390x"
},
"product_reference": "util-linux-systemd-2.40.4-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-systemd-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "util-linux-systemd-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-tty-tools-2.40.4-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-tty-tools-2.40.4-150700.4.3.1.aarch64"
},
"product_reference": "util-linux-tty-tools-2.40.4-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-tty-tools-2.40.4-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-tty-tools-2.40.4-150700.4.3.1.ppc64le"
},
"product_reference": "util-linux-tty-tools-2.40.4-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-tty-tools-2.40.4-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-tty-tools-2.40.4-150700.4.3.1.s390x"
},
"product_reference": "util-linux-tty-tools-2.40.4-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-tty-tools-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-tty-tools-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "util-linux-tty-tools-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-2.40.4-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:uuidd-2.40.4-150700.4.3.1.aarch64"
},
"product_reference": "uuidd-2.40.4-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-2.40.4-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:uuidd-2.40.4-150700.4.3.1.ppc64le"
},
"product_reference": "uuidd-2.40.4-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-2.40.4-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:uuidd-2.40.4-150700.4.3.1.s390x"
},
"product_reference": "uuidd-2.40.4-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uuidd-2.40.4-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:uuidd-2.40.4-150700.4.3.1.x86_64"
},
"product_reference": "uuidd-2.40.4-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14104"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-static-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-static-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-static-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-static-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-32bit-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk-devel-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk-devel-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk-devel-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk-devel-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk1-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk1-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk1-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk1-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount-devel-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount-devel-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount-devel-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount-devel-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-32bit-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols-devel-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols-devel-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols-devel-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols-devel-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols1-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols1-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols1-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols1-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-static-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-static-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-static-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-static-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-32bit-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-extra-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-lang-2.40.4-150700.4.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-systemd-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-systemd-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-systemd-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-systemd-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-tty-tools-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-tty-tools-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-tty-tools-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-tty-tools-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:uuidd-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:uuidd-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:uuidd-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:uuidd-2.40.4-150700.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14104",
"url": "https://www.suse.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "SUSE Bug 1254666 for CVE-2025-14104",
"url": "https://bugzilla.suse.com/1254666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-static-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-static-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-static-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-static-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-32bit-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk-devel-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk-devel-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk-devel-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk-devel-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk1-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk1-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk1-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk1-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount-devel-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount-devel-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount-devel-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount-devel-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-32bit-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols-devel-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols-devel-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols-devel-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols-devel-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols1-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols1-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols1-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols1-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-static-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-static-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-static-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-static-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-32bit-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-extra-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-lang-2.40.4-150700.4.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-systemd-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-systemd-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-systemd-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-systemd-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-tty-tools-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-tty-tools-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-tty-tools-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-tty-tools-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:uuidd-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:uuidd-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:uuidd-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:uuidd-2.40.4-150700.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-static-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-static-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-static-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid-devel-static-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libblkid1-32bit-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk-devel-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk-devel-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk-devel-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk-devel-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk1-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk1-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk1-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libfdisk1-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount-devel-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount-devel-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount-devel-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount-devel-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libmount1-32bit-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols-devel-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols-devel-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols-devel-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols-devel-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols1-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols1-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols1-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsmartcols1-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-static-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-static-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-static-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid-devel-static-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libuuid1-32bit-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-extra-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-lang-2.40.4-150700.4.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-systemd-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-systemd-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-systemd-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-systemd-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-tty-tools-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-tty-tools-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-tty-tools-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:util-linux-tty-tools-2.40.4-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:uuidd-2.40.4-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:uuidd-2.40.4-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:uuidd-2.40.4-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:uuidd-2.40.4-150700.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:22:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-14104"
}
]
}
SUSE-SU-2026:0117-1
Vulnerability from csaf_suse - Published: 2026-01-13 04:33 - Updated: 2026-01-13 04:33Summary
Security update for util-linux
Notes
Title of the patch
Security update for util-linux
Description of the patch
This update for util-linux fixes the following issues:
- CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666).
- lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682).
Patchnames
SUSE-2026-117,SUSE-SLE-Micro-5.5-2026-117,openSUSE-SLE-15.6-2026-117
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for util-linux",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for util-linux fixes the following issues:\n\n- CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666).\n- lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-117,SUSE-SLE-Micro-5.5-2026-117,openSUSE-SLE-15.6-2026-117",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0117-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0117-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260117-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0117-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023736.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254666",
"url": "https://bugzilla.suse.com/1254666"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14104 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14104/"
}
],
"title": "Security update for util-linux",
"tracking": {
"current_release_date": "2026-01-13T04:33:43Z",
"generator": {
"date": "2026-01-13T04:33:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0117-1",
"initial_release_date": "2026-01-13T04:33:43Z",
"revision_history": [
{
"date": "2026-01-13T04:33:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "libblkid-devel-2.37.4-150500.9.20.1.aarch64",
"product_id": "libblkid-devel-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "libblkid-devel-static-2.37.4-150500.9.20.1.aarch64",
"product_id": "libblkid-devel-static-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libblkid1-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "libblkid1-2.37.4-150500.9.20.1.aarch64",
"product_id": "libblkid1-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "libfdisk-devel-2.37.4-150500.9.20.1.aarch64",
"product_id": "libfdisk-devel-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "libfdisk-devel-static-2.37.4-150500.9.20.1.aarch64",
"product_id": "libfdisk-devel-static-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "libfdisk1-2.37.4-150500.9.20.1.aarch64",
"product_id": "libfdisk1-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "libmount-devel-2.37.4-150500.9.20.1.aarch64",
"product_id": "libmount-devel-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "libmount-devel-static-2.37.4-150500.9.20.1.aarch64",
"product_id": "libmount-devel-static-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount1-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "libmount1-2.37.4-150500.9.20.1.aarch64",
"product_id": "libmount1-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "libsmartcols-devel-2.37.4-150500.9.20.1.aarch64",
"product_id": "libsmartcols-devel-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "libsmartcols-devel-static-2.37.4-150500.9.20.1.aarch64",
"product_id": "libsmartcols-devel-static-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "libsmartcols1-2.37.4-150500.9.20.1.aarch64",
"product_id": "libsmartcols1-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "libuuid-devel-2.37.4-150500.9.20.1.aarch64",
"product_id": "libuuid-devel-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "libuuid-devel-static-2.37.4-150500.9.20.1.aarch64",
"product_id": "libuuid-devel-static-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid1-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "libuuid1-2.37.4-150500.9.20.1.aarch64",
"product_id": "libuuid1-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "python3-libmount-2.37.4-150500.9.20.1.aarch64",
"product_id": "python3-libmount-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "util-linux-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "util-linux-2.37.4-150500.9.20.1.aarch64",
"product_id": "util-linux-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "util-linux-systemd-2.37.4-150500.9.20.1.aarch64",
"product_id": "util-linux-systemd-2.37.4-150500.9.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "uuidd-2.37.4-150500.9.20.1.aarch64",
"product": {
"name": "uuidd-2.37.4-150500.9.20.1.aarch64",
"product_id": "uuidd-2.37.4-150500.9.20.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product": {
"name": "libblkid-devel-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product_id": "libblkid-devel-64bit-2.37.4-150500.9.20.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libblkid1-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product": {
"name": "libblkid1-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product_id": "libblkid1-64bit-2.37.4-150500.9.20.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product": {
"name": "libfdisk-devel-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product_id": "libfdisk-devel-64bit-2.37.4-150500.9.20.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libfdisk1-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product": {
"name": "libfdisk1-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product_id": "libfdisk1-64bit-2.37.4-150500.9.20.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libmount-devel-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product": {
"name": "libmount-devel-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product_id": "libmount-devel-64bit-2.37.4-150500.9.20.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libmount1-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product": {
"name": "libmount1-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product_id": "libmount1-64bit-2.37.4-150500.9.20.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product": {
"name": "libsmartcols-devel-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product_id": "libsmartcols-devel-64bit-2.37.4-150500.9.20.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libsmartcols1-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product": {
"name": "libsmartcols1-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product_id": "libsmartcols1-64bit-2.37.4-150500.9.20.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libuuid-devel-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product": {
"name": "libuuid-devel-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product_id": "libuuid-devel-64bit-2.37.4-150500.9.20.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libuuid1-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product": {
"name": "libuuid1-64bit-2.37.4-150500.9.20.1.aarch64_ilp32",
"product_id": "libuuid1-64bit-2.37.4-150500.9.20.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.37.4-150500.9.20.1.i586",
"product": {
"name": "libblkid-devel-2.37.4-150500.9.20.1.i586",
"product_id": "libblkid-devel-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.37.4-150500.9.20.1.i586",
"product": {
"name": "libblkid-devel-static-2.37.4-150500.9.20.1.i586",
"product_id": "libblkid-devel-static-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "libblkid1-2.37.4-150500.9.20.1.i586",
"product": {
"name": "libblkid1-2.37.4-150500.9.20.1.i586",
"product_id": "libblkid1-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.37.4-150500.9.20.1.i586",
"product": {
"name": "libfdisk-devel-2.37.4-150500.9.20.1.i586",
"product_id": "libfdisk-devel-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.37.4-150500.9.20.1.i586",
"product": {
"name": "libfdisk-devel-static-2.37.4-150500.9.20.1.i586",
"product_id": "libfdisk-devel-static-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.37.4-150500.9.20.1.i586",
"product": {
"name": "libfdisk1-2.37.4-150500.9.20.1.i586",
"product_id": "libfdisk1-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.37.4-150500.9.20.1.i586",
"product": {
"name": "libmount-devel-2.37.4-150500.9.20.1.i586",
"product_id": "libmount-devel-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.37.4-150500.9.20.1.i586",
"product": {
"name": "libmount-devel-static-2.37.4-150500.9.20.1.i586",
"product_id": "libmount-devel-static-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "libmount1-2.37.4-150500.9.20.1.i586",
"product": {
"name": "libmount1-2.37.4-150500.9.20.1.i586",
"product_id": "libmount1-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.37.4-150500.9.20.1.i586",
"product": {
"name": "libsmartcols-devel-2.37.4-150500.9.20.1.i586",
"product_id": "libsmartcols-devel-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.37.4-150500.9.20.1.i586",
"product": {
"name": "libsmartcols-devel-static-2.37.4-150500.9.20.1.i586",
"product_id": "libsmartcols-devel-static-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.37.4-150500.9.20.1.i586",
"product": {
"name": "libsmartcols1-2.37.4-150500.9.20.1.i586",
"product_id": "libsmartcols1-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.37.4-150500.9.20.1.i586",
"product": {
"name": "libuuid-devel-2.37.4-150500.9.20.1.i586",
"product_id": "libuuid-devel-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.37.4-150500.9.20.1.i586",
"product": {
"name": "libuuid-devel-static-2.37.4-150500.9.20.1.i586",
"product_id": "libuuid-devel-static-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "libuuid1-2.37.4-150500.9.20.1.i586",
"product": {
"name": "libuuid1-2.37.4-150500.9.20.1.i586",
"product_id": "libuuid1-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.37.4-150500.9.20.1.i586",
"product": {
"name": "python3-libmount-2.37.4-150500.9.20.1.i586",
"product_id": "python3-libmount-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "util-linux-2.37.4-150500.9.20.1.i586",
"product": {
"name": "util-linux-2.37.4-150500.9.20.1.i586",
"product_id": "util-linux-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.37.4-150500.9.20.1.i586",
"product": {
"name": "util-linux-systemd-2.37.4-150500.9.20.1.i586",
"product_id": "util-linux-systemd-2.37.4-150500.9.20.1.i586"
}
},
{
"category": "product_version",
"name": "uuidd-2.37.4-150500.9.20.1.i586",
"product": {
"name": "uuidd-2.37.4-150500.9.20.1.i586",
"product_id": "uuidd-2.37.4-150500.9.20.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "util-linux-lang-2.37.4-150500.9.20.1.noarch",
"product": {
"name": "util-linux-lang-2.37.4-150500.9.20.1.noarch",
"product_id": "util-linux-lang-2.37.4-150500.9.20.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "libblkid-devel-2.37.4-150500.9.20.1.ppc64le",
"product_id": "libblkid-devel-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "libblkid-devel-static-2.37.4-150500.9.20.1.ppc64le",
"product_id": "libblkid-devel-static-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libblkid1-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "libblkid1-2.37.4-150500.9.20.1.ppc64le",
"product_id": "libblkid1-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "libfdisk-devel-2.37.4-150500.9.20.1.ppc64le",
"product_id": "libfdisk-devel-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "libfdisk-devel-static-2.37.4-150500.9.20.1.ppc64le",
"product_id": "libfdisk-devel-static-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "libfdisk1-2.37.4-150500.9.20.1.ppc64le",
"product_id": "libfdisk1-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "libmount-devel-2.37.4-150500.9.20.1.ppc64le",
"product_id": "libmount-devel-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "libmount-devel-static-2.37.4-150500.9.20.1.ppc64le",
"product_id": "libmount-devel-static-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount1-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "libmount1-2.37.4-150500.9.20.1.ppc64le",
"product_id": "libmount1-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "libsmartcols-devel-2.37.4-150500.9.20.1.ppc64le",
"product_id": "libsmartcols-devel-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "libsmartcols-devel-static-2.37.4-150500.9.20.1.ppc64le",
"product_id": "libsmartcols-devel-static-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "libsmartcols1-2.37.4-150500.9.20.1.ppc64le",
"product_id": "libsmartcols1-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "libuuid-devel-2.37.4-150500.9.20.1.ppc64le",
"product_id": "libuuid-devel-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "libuuid-devel-static-2.37.4-150500.9.20.1.ppc64le",
"product_id": "libuuid-devel-static-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid1-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "libuuid1-2.37.4-150500.9.20.1.ppc64le",
"product_id": "libuuid1-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "python3-libmount-2.37.4-150500.9.20.1.ppc64le",
"product_id": "python3-libmount-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "util-linux-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "util-linux-2.37.4-150500.9.20.1.ppc64le",
"product_id": "util-linux-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "util-linux-systemd-2.37.4-150500.9.20.1.ppc64le",
"product_id": "util-linux-systemd-2.37.4-150500.9.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uuidd-2.37.4-150500.9.20.1.ppc64le",
"product": {
"name": "uuidd-2.37.4-150500.9.20.1.ppc64le",
"product_id": "uuidd-2.37.4-150500.9.20.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "libblkid-devel-2.37.4-150500.9.20.1.s390x",
"product_id": "libblkid-devel-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "libblkid-devel-static-2.37.4-150500.9.20.1.s390x",
"product_id": "libblkid-devel-static-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libblkid1-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "libblkid1-2.37.4-150500.9.20.1.s390x",
"product_id": "libblkid1-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "libfdisk-devel-2.37.4-150500.9.20.1.s390x",
"product_id": "libfdisk-devel-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "libfdisk-devel-static-2.37.4-150500.9.20.1.s390x",
"product_id": "libfdisk-devel-static-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "libfdisk1-2.37.4-150500.9.20.1.s390x",
"product_id": "libfdisk1-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "libmount-devel-2.37.4-150500.9.20.1.s390x",
"product_id": "libmount-devel-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "libmount-devel-static-2.37.4-150500.9.20.1.s390x",
"product_id": "libmount-devel-static-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount1-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "libmount1-2.37.4-150500.9.20.1.s390x",
"product_id": "libmount1-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "libsmartcols-devel-2.37.4-150500.9.20.1.s390x",
"product_id": "libsmartcols-devel-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "libsmartcols-devel-static-2.37.4-150500.9.20.1.s390x",
"product_id": "libsmartcols-devel-static-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "libsmartcols1-2.37.4-150500.9.20.1.s390x",
"product_id": "libsmartcols1-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "libuuid-devel-2.37.4-150500.9.20.1.s390x",
"product_id": "libuuid-devel-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "libuuid-devel-static-2.37.4-150500.9.20.1.s390x",
"product_id": "libuuid-devel-static-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid1-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "libuuid1-2.37.4-150500.9.20.1.s390x",
"product_id": "libuuid1-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "python3-libmount-2.37.4-150500.9.20.1.s390x",
"product_id": "python3-libmount-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "util-linux-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "util-linux-2.37.4-150500.9.20.1.s390x",
"product_id": "util-linux-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "util-linux-extra-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "util-linux-extra-2.37.4-150500.9.20.1.s390x",
"product_id": "util-linux-extra-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "util-linux-systemd-2.37.4-150500.9.20.1.s390x",
"product_id": "util-linux-systemd-2.37.4-150500.9.20.1.s390x"
}
},
{
"category": "product_version",
"name": "uuidd-2.37.4-150500.9.20.1.s390x",
"product": {
"name": "uuidd-2.37.4-150500.9.20.1.s390x",
"product_id": "uuidd-2.37.4-150500.9.20.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libblkid-devel-2.37.4-150500.9.20.1.x86_64",
"product_id": "libblkid-devel-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-32bit-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libblkid-devel-32bit-2.37.4-150500.9.20.1.x86_64",
"product_id": "libblkid-devel-32bit-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libblkid-devel-static-2.37.4-150500.9.20.1.x86_64",
"product_id": "libblkid-devel-static-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid1-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libblkid1-2.37.4-150500.9.20.1.x86_64",
"product_id": "libblkid1-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid1-32bit-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libblkid1-32bit-2.37.4-150500.9.20.1.x86_64",
"product_id": "libblkid1-32bit-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libfdisk-devel-2.37.4-150500.9.20.1.x86_64",
"product_id": "libfdisk-devel-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-32bit-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libfdisk-devel-32bit-2.37.4-150500.9.20.1.x86_64",
"product_id": "libfdisk-devel-32bit-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libfdisk-devel-static-2.37.4-150500.9.20.1.x86_64",
"product_id": "libfdisk-devel-static-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libfdisk1-2.37.4-150500.9.20.1.x86_64",
"product_id": "libfdisk1-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk1-32bit-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libfdisk1-32bit-2.37.4-150500.9.20.1.x86_64",
"product_id": "libfdisk1-32bit-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libmount-devel-2.37.4-150500.9.20.1.x86_64",
"product_id": "libmount-devel-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-32bit-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libmount-devel-32bit-2.37.4-150500.9.20.1.x86_64",
"product_id": "libmount-devel-32bit-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libmount-devel-static-2.37.4-150500.9.20.1.x86_64",
"product_id": "libmount-devel-static-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount1-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libmount1-2.37.4-150500.9.20.1.x86_64",
"product_id": "libmount1-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount1-32bit-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libmount1-32bit-2.37.4-150500.9.20.1.x86_64",
"product_id": "libmount1-32bit-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libsmartcols-devel-2.37.4-150500.9.20.1.x86_64",
"product_id": "libsmartcols-devel-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-32bit-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libsmartcols-devel-32bit-2.37.4-150500.9.20.1.x86_64",
"product_id": "libsmartcols-devel-32bit-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libsmartcols-devel-static-2.37.4-150500.9.20.1.x86_64",
"product_id": "libsmartcols-devel-static-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libsmartcols1-2.37.4-150500.9.20.1.x86_64",
"product_id": "libsmartcols1-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-32bit-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libsmartcols1-32bit-2.37.4-150500.9.20.1.x86_64",
"product_id": "libsmartcols1-32bit-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libuuid-devel-2.37.4-150500.9.20.1.x86_64",
"product_id": "libuuid-devel-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-32bit-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libuuid-devel-32bit-2.37.4-150500.9.20.1.x86_64",
"product_id": "libuuid-devel-32bit-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libuuid-devel-static-2.37.4-150500.9.20.1.x86_64",
"product_id": "libuuid-devel-static-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid1-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libuuid1-2.37.4-150500.9.20.1.x86_64",
"product_id": "libuuid1-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid1-32bit-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "libuuid1-32bit-2.37.4-150500.9.20.1.x86_64",
"product_id": "libuuid1-32bit-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-libmount-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "python3-libmount-2.37.4-150500.9.20.1.x86_64",
"product_id": "python3-libmount-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "util-linux-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "util-linux-2.37.4-150500.9.20.1.x86_64",
"product_id": "util-linux-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "util-linux-systemd-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "util-linux-systemd-2.37.4-150500.9.20.1.x86_64",
"product_id": "util-linux-systemd-2.37.4-150500.9.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "uuidd-2.37.4-150500.9.20.1.x86_64",
"product": {
"name": "uuidd-2.37.4-150500.9.20.1.x86_64",
"product_id": "uuidd-2.37.4-150500.9.20.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.37.4-150500.9.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libblkid1-2.37.4-150500.9.20.1.aarch64"
},
"product_reference": "libblkid1-2.37.4-150500.9.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.37.4-150500.9.20.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libblkid1-2.37.4-150500.9.20.1.ppc64le"
},
"product_reference": "libblkid1-2.37.4-150500.9.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.37.4-150500.9.20.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libblkid1-2.37.4-150500.9.20.1.s390x"
},
"product_reference": "libblkid1-2.37.4-150500.9.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.37.4-150500.9.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libblkid1-2.37.4-150500.9.20.1.x86_64"
},
"product_reference": "libblkid1-2.37.4-150500.9.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.37.4-150500.9.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libfdisk1-2.37.4-150500.9.20.1.aarch64"
},
"product_reference": "libfdisk1-2.37.4-150500.9.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.37.4-150500.9.20.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libfdisk1-2.37.4-150500.9.20.1.ppc64le"
},
"product_reference": "libfdisk1-2.37.4-150500.9.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.37.4-150500.9.20.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libfdisk1-2.37.4-150500.9.20.1.s390x"
},
"product_reference": "libfdisk1-2.37.4-150500.9.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.37.4-150500.9.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libfdisk1-2.37.4-150500.9.20.1.x86_64"
},
"product_reference": "libfdisk1-2.37.4-150500.9.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.37.4-150500.9.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libmount1-2.37.4-150500.9.20.1.aarch64"
},
"product_reference": "libmount1-2.37.4-150500.9.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.37.4-150500.9.20.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libmount1-2.37.4-150500.9.20.1.ppc64le"
},
"product_reference": "libmount1-2.37.4-150500.9.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.37.4-150500.9.20.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libmount1-2.37.4-150500.9.20.1.s390x"
},
"product_reference": "libmount1-2.37.4-150500.9.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.37.4-150500.9.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libmount1-2.37.4-150500.9.20.1.x86_64"
},
"product_reference": "libmount1-2.37.4-150500.9.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.37.4-150500.9.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libsmartcols1-2.37.4-150500.9.20.1.aarch64"
},
"product_reference": "libsmartcols1-2.37.4-150500.9.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.37.4-150500.9.20.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libsmartcols1-2.37.4-150500.9.20.1.ppc64le"
},
"product_reference": "libsmartcols1-2.37.4-150500.9.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.37.4-150500.9.20.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libsmartcols1-2.37.4-150500.9.20.1.s390x"
},
"product_reference": "libsmartcols1-2.37.4-150500.9.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.37.4-150500.9.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libsmartcols1-2.37.4-150500.9.20.1.x86_64"
},
"product_reference": "libsmartcols1-2.37.4-150500.9.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.37.4-150500.9.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libuuid1-2.37.4-150500.9.20.1.aarch64"
},
"product_reference": "libuuid1-2.37.4-150500.9.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.37.4-150500.9.20.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libuuid1-2.37.4-150500.9.20.1.ppc64le"
},
"product_reference": "libuuid1-2.37.4-150500.9.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.37.4-150500.9.20.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libuuid1-2.37.4-150500.9.20.1.s390x"
},
"product_reference": "libuuid1-2.37.4-150500.9.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.37.4-150500.9.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libuuid1-2.37.4-150500.9.20.1.x86_64"
},
"product_reference": "libuuid1-2.37.4-150500.9.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.37.4-150500.9.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:util-linux-2.37.4-150500.9.20.1.aarch64"
},
"product_reference": "util-linux-2.37.4-150500.9.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.37.4-150500.9.20.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:util-linux-2.37.4-150500.9.20.1.ppc64le"
},
"product_reference": "util-linux-2.37.4-150500.9.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.37.4-150500.9.20.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:util-linux-2.37.4-150500.9.20.1.s390x"
},
"product_reference": "util-linux-2.37.4-150500.9.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.37.4-150500.9.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:util-linux-2.37.4-150500.9.20.1.x86_64"
},
"product_reference": "util-linux-2.37.4-150500.9.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-extra-2.37.4-150500.9.20.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:util-linux-extra-2.37.4-150500.9.20.1.s390x"
},
"product_reference": "util-linux-extra-2.37.4-150500.9.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.37.4-150500.9.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:util-linux-systemd-2.37.4-150500.9.20.1.aarch64"
},
"product_reference": "util-linux-systemd-2.37.4-150500.9.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.37.4-150500.9.20.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:util-linux-systemd-2.37.4-150500.9.20.1.ppc64le"
},
"product_reference": "util-linux-systemd-2.37.4-150500.9.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.37.4-150500.9.20.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:util-linux-systemd-2.37.4-150500.9.20.1.s390x"
},
"product_reference": "util-linux-systemd-2.37.4-150500.9.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-systemd-2.37.4-150500.9.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:util-linux-systemd-2.37.4-150500.9.20.1.x86_64"
},
"product_reference": "util-linux-systemd-2.37.4-150500.9.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-extra-2.37.4-150500.9.20.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:util-linux-extra-2.37.4-150500.9.20.1.s390x"
},
"product_reference": "util-linux-extra-2.37.4-150500.9.20.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14104"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:libblkid1-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libblkid1-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libblkid1-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libblkid1-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libfdisk1-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libfdisk1-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libfdisk1-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libfdisk1-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libmount1-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libmount1-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libmount1-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libmount1-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libsmartcols1-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libsmartcols1-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libsmartcols1-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libsmartcols1-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libuuid1-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libuuid1-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libuuid1-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libuuid1-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:util-linux-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:util-linux-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:util-linux-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:util-linux-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:util-linux-extra-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:util-linux-systemd-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:util-linux-systemd-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:util-linux-systemd-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:util-linux-systemd-2.37.4-150500.9.20.1.x86_64",
"openSUSE Leap 15.6:util-linux-extra-2.37.4-150500.9.20.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14104",
"url": "https://www.suse.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "SUSE Bug 1254666 for CVE-2025-14104",
"url": "https://bugzilla.suse.com/1254666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:libblkid1-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libblkid1-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libblkid1-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libblkid1-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libfdisk1-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libfdisk1-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libfdisk1-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libfdisk1-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libmount1-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libmount1-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libmount1-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libmount1-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libsmartcols1-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libsmartcols1-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libsmartcols1-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libsmartcols1-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libuuid1-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libuuid1-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libuuid1-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libuuid1-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:util-linux-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:util-linux-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:util-linux-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:util-linux-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:util-linux-extra-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:util-linux-systemd-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:util-linux-systemd-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:util-linux-systemd-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:util-linux-systemd-2.37.4-150500.9.20.1.x86_64",
"openSUSE Leap 15.6:util-linux-extra-2.37.4-150500.9.20.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:libblkid1-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libblkid1-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libblkid1-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libblkid1-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libfdisk1-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libfdisk1-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libfdisk1-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libfdisk1-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libmount1-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libmount1-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libmount1-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libmount1-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libsmartcols1-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libsmartcols1-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libsmartcols1-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libsmartcols1-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libuuid1-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libuuid1-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libuuid1-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libuuid1-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:util-linux-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:util-linux-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:util-linux-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:util-linux-2.37.4-150500.9.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:util-linux-extra-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:util-linux-systemd-2.37.4-150500.9.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:util-linux-systemd-2.37.4-150500.9.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:util-linux-systemd-2.37.4-150500.9.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:util-linux-systemd-2.37.4-150500.9.20.1.x86_64",
"openSUSE Leap 15.6:util-linux-extra-2.37.4-150500.9.20.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-13T04:33:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-14104"
}
]
}
MSRC_CVE-2025-14104
Vulnerability from csaf_microsoft - Published: 2025-12-02 00:00 - Updated: 2026-01-08 14:44Summary
Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames
Notes
Additional Resources
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer
The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-14104 Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-14104.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames",
"tracking": {
"current_release_date": "2026-01-08T14:44:17.000Z",
"generator": {
"date": "2026-02-18T14:12:24.908Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-14104",
"initial_release_date": "2025-12-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-12-13T01:02:19.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-12-27T14:36:13.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2025-12-30T14:36:04.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
},
{
"date": "2026-01-03T01:40:23.000Z",
"legacy_version": "4",
"number": "4",
"summary": "Information published."
},
{
"date": "2026-01-08T14:44:17.000Z",
"legacy_version": "5",
"number": "5",
"summary": "Information published."
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 util-linux 2.37.4-9",
"product": {
"name": "\u003ccbl2 util-linux 2.37.4-9",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "cbl2 util-linux 2.37.4-9",
"product": {
"name": "cbl2 util-linux 2.37.4-9",
"product_id": "20195"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 util-linux 2.37.4-10",
"product": {
"name": "\u003ccbl2 util-linux 2.37.4-10",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 util-linux 2.37.4-10",
"product": {
"name": "cbl2 util-linux 2.37.4-10",
"product_id": "20786"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 util-linux 2.40.2-1",
"product": {
"name": "\u003cazl3 util-linux 2.40.2-1",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "azl3 util-linux 2.40.2-1",
"product": {
"name": "azl3 util-linux 2.40.2-1",
"product_id": "20754"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 util-linux 2.40.2-3",
"product": {
"name": "\u003cazl3 util-linux 2.40.2-3",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 util-linux 2.40.2-3",
"product": {
"name": "azl3 util-linux 2.40.2-3",
"product_id": "20804"
}
}
],
"category": "product_name",
"name": "util-linux"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 util-linux 2.37.4-9 as a component of CBL Mariner 2.0",
"product_id": "17086-4"
},
"product_reference": "4",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 util-linux 2.37.4-9 as a component of CBL Mariner 2.0",
"product_id": "20195-17086"
},
"product_reference": "20195",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 util-linux 2.37.4-10 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 util-linux 2.37.4-10 as a component of CBL Mariner 2.0",
"product_id": "20786-17086"
},
"product_reference": "20786",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 util-linux 2.40.2-1 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 util-linux 2.40.2-1 as a component of Azure Linux 3.0",
"product_id": "20754-17084"
},
"product_reference": "20754",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 util-linux 2.40.2-3 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 util-linux 2.40.2-3 as a component of Azure Linux 3.0",
"product_id": "20804-17084"
},
"product_reference": "20804",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14104",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "general",
"text": "redhat",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20195-17086",
"20786-17086",
"20754-17084",
"20804-17084"
],
"known_affected": [
"17086-4",
"17086-2",
"17084-3",
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-14104 Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-14104.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-13T01:02:19.000Z",
"details": "2.37.4-10:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-4",
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-12-13T01:02:19.000Z",
"details": "2.40.2-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-3"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-12-13T01:02:19.000Z",
"details": "2.40.2-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 6.1,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"17086-4",
"17086-2",
"17084-3",
"17084-1"
]
}
],
"title": "Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames"
}
]
}
WID-SEC-W-2025-2755
Vulnerability from csaf_certbund - Published: 2025-12-07 23:00 - Updated: 2026-02-16 23:00Summary
util-linux: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die util-linux Pakete enthalten viele verschiedene low-level Systemwerkzeuge, welche unerlässlich für den Betrieb eines Linux Betriebssystems sind.
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in util-linux ausnutzen, um einen Denial of Service Angriff durchzuführen und vertrauliche Informationen offenzulegen.
Betroffene Betriebssysteme
- UNIX
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Die util-linux Pakete enthalten viele verschiedene low-level Systemwerkzeuge, welche \tunerl\u00e4sslich f\u00fcr den Betrieb eines Linux Betriebssystems sind.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in util-linux ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und vertrauliche Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2755 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2755.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2755 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2755"
},
{
"category": "external",
"summary": "RedHat Bugzilla vom 2025-12-07",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
},
{
"category": "external",
"summary": "NIST Vulnerability Database vom 2025-12-07",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-FC18AB1E37 vom 2025-12-15",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-fc18ab1e37"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-40FE2FEC53 vom 2025-12-15",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-40fe2fec53"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0115-1 vom 2026-01-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023734.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0115-1 vom 2026-01-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZSPMUHRPI2R4DPBBOXJT6OD5HGH4IIC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0117-1 vom 2026-01-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCDDIEZJB5O7D45E3JCDB2WEKISIY7SI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0116-1 vom 2026-01-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ESK624LTBKFBDJBARUR46B2AD3X5S7DO/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10072-1 vom 2026-01-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G5G2JJVI4UH5BGGO6SOSOX4UIFSEXSE3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0230-1 vom 2026-01-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023855.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1696 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1696"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1696 vom 2026-02-02",
"url": "http://linux.oracle.com/errata/ELSA-2026-1696.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0366-1 vom 2026-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024040.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1852 vom 2026-02-04",
"url": "https://access.redhat.com/errata/RHSA-2026:1852"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1913 vom 2026-02-04",
"url": "https://access.redhat.com/errata/RHSA-2026:1913"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1913 vom 2026-02-05",
"url": "https://linux.oracle.com/errata/ELSA-2026-1913.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1696 vom 2026-02-05",
"url": "https://errata.build.resf.org/RLSA-2026:1696"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1852 vom 2026-02-04",
"url": "https://linux.oracle.com/errata/ELSA-2026-1852.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1852 vom 2026-02-04",
"url": "http://linux.oracle.com/errata/ELSA-2026-1852.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1913 vom 2026-02-05",
"url": "https://errata.build.resf.org/RLSA-2026:1913"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1852 vom 2026-02-06",
"url": "https://errata.build.resf.org/RLSA-2026:1852"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2485 vom 2026-02-10",
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2563 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0510-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024236.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2737 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"source_lang": "en-US",
"title": "util-linux: Schwachstelle erm\u00f6glicht Denial of Service und Offenlegung von Informationen",
"tracking": {
"current_release_date": "2026-02-16T23:00:00.000+00:00",
"generator": {
"date": "2026-02-17T09:10:50.780+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2755",
"initial_release_date": "2025-12-07T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-12-07T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2026-01-12T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-20T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-01-22T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-02T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat, Oracle Linux und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-10T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "15"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source util-linux",
"product": {
"name": "Open Source util-linux",
"product_id": "T049174",
"product_identification_helper": {
"cpe": "cpe:/a:util-linux:util-linux:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14104",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T049174",
"T027843",
"T004914",
"T032255",
"74185"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-14104"
}
]
}
GHSA-HRX4-RCCM-XJ6C
Vulnerability from github – Published: 2025-12-05 18:31 – Updated: 2026-02-17 12:31
VLAI?
Details
A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the setpwnam() function, affecting SUID (Set User ID) login-utils utilities writing to the password database.
Severity ?
6.1 (Medium)
{
"affected": [],
"aliases": [
"CVE-2025-14104"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-12-05T17:16:03Z",
"severity": "MODERATE"
},
"details": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"id": "GHSA-hrx4-rccm-xj6c",
"modified": "2026-02-17T12:31:07Z",
"published": "2025-12-05T18:31:11Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:1696"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:1852"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:1913"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:2800"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"type": "CVSS_V3"
}
]
}
OPENSUSE-SU-2026:10072-1
Vulnerability from csaf_opensuse - Published: 2026-01-19 00:00 - Updated: 2026-01-19 00:00Summary
libblkid-devel-2.41.3-1.1 on GA media
Notes
Title of the patch
libblkid-devel-2.41.3-1.1 on GA media
Description of the patch
These are all security issues fixed in the libblkid-devel-2.41.3-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2026-10072
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libblkid-devel-2.41.3-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libblkid-devel-2.41.3-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10072",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10072-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14104 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14104/"
}
],
"title": "libblkid-devel-2.41.3-1.1 on GA media",
"tracking": {
"current_release_date": "2026-01-19T00:00:00Z",
"generator": {
"date": "2026-01-19T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10072-1",
"initial_release_date": "2026-01-19T00:00:00Z",
"revision_history": [
{
"date": "2026-01-19T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.41.3-1.1.aarch64",
"product": {
"name": "libblkid-devel-2.41.3-1.1.aarch64",
"product_id": "libblkid-devel-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-32bit-2.41.3-1.1.aarch64",
"product": {
"name": "libblkid-devel-32bit-2.41.3-1.1.aarch64",
"product_id": "libblkid-devel-32bit-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.41.3-1.1.aarch64",
"product": {
"name": "libblkid-devel-static-2.41.3-1.1.aarch64",
"product_id": "libblkid-devel-static-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libblkid1-2.41.3-1.1.aarch64",
"product": {
"name": "libblkid1-2.41.3-1.1.aarch64",
"product_id": "libblkid1-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libblkid1-32bit-2.41.3-1.1.aarch64",
"product": {
"name": "libblkid1-32bit-2.41.3-1.1.aarch64",
"product_id": "libblkid1-32bit-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.41.3-1.1.aarch64",
"product": {
"name": "libfdisk-devel-2.41.3-1.1.aarch64",
"product_id": "libfdisk-devel-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-32bit-2.41.3-1.1.aarch64",
"product": {
"name": "libfdisk-devel-32bit-2.41.3-1.1.aarch64",
"product_id": "libfdisk-devel-32bit-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.41.3-1.1.aarch64",
"product": {
"name": "libfdisk-devel-static-2.41.3-1.1.aarch64",
"product_id": "libfdisk-devel-static-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.41.3-1.1.aarch64",
"product": {
"name": "libfdisk1-2.41.3-1.1.aarch64",
"product_id": "libfdisk1-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfdisk1-32bit-2.41.3-1.1.aarch64",
"product": {
"name": "libfdisk1-32bit-2.41.3-1.1.aarch64",
"product_id": "libfdisk1-32bit-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.41.3-1.1.aarch64",
"product": {
"name": "libmount-devel-2.41.3-1.1.aarch64",
"product_id": "libmount-devel-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount-devel-32bit-2.41.3-1.1.aarch64",
"product": {
"name": "libmount-devel-32bit-2.41.3-1.1.aarch64",
"product_id": "libmount-devel-32bit-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.41.3-1.1.aarch64",
"product": {
"name": "libmount-devel-static-2.41.3-1.1.aarch64",
"product_id": "libmount-devel-static-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount1-2.41.3-1.1.aarch64",
"product": {
"name": "libmount1-2.41.3-1.1.aarch64",
"product_id": "libmount1-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmount1-32bit-2.41.3-1.1.aarch64",
"product": {
"name": "libmount1-32bit-2.41.3-1.1.aarch64",
"product_id": "libmount1-32bit-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.41.3-1.1.aarch64",
"product": {
"name": "libsmartcols-devel-2.41.3-1.1.aarch64",
"product_id": "libsmartcols-devel-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-32bit-2.41.3-1.1.aarch64",
"product": {
"name": "libsmartcols-devel-32bit-2.41.3-1.1.aarch64",
"product_id": "libsmartcols-devel-32bit-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.41.3-1.1.aarch64",
"product": {
"name": "libsmartcols-devel-static-2.41.3-1.1.aarch64",
"product_id": "libsmartcols-devel-static-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.41.3-1.1.aarch64",
"product": {
"name": "libsmartcols1-2.41.3-1.1.aarch64",
"product_id": "libsmartcols1-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-32bit-2.41.3-1.1.aarch64",
"product": {
"name": "libsmartcols1-32bit-2.41.3-1.1.aarch64",
"product_id": "libsmartcols1-32bit-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.41.3-1.1.aarch64",
"product": {
"name": "libuuid-devel-2.41.3-1.1.aarch64",
"product_id": "libuuid-devel-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-32bit-2.41.3-1.1.aarch64",
"product": {
"name": "libuuid-devel-32bit-2.41.3-1.1.aarch64",
"product_id": "libuuid-devel-32bit-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.41.3-1.1.aarch64",
"product": {
"name": "libuuid-devel-static-2.41.3-1.1.aarch64",
"product_id": "libuuid-devel-static-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid1-2.41.3-1.1.aarch64",
"product": {
"name": "libuuid1-2.41.3-1.1.aarch64",
"product_id": "libuuid1-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libuuid1-32bit-2.41.3-1.1.aarch64",
"product": {
"name": "libuuid1-32bit-2.41.3-1.1.aarch64",
"product_id": "libuuid1-32bit-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "util-linux-2.41.3-1.1.aarch64",
"product": {
"name": "util-linux-2.41.3-1.1.aarch64",
"product_id": "util-linux-2.41.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "util-linux-lang-2.41.3-1.1.aarch64",
"product": {
"name": "util-linux-lang-2.41.3-1.1.aarch64",
"product_id": "util-linux-lang-2.41.3-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.41.3-1.1.ppc64le",
"product": {
"name": "libblkid-devel-2.41.3-1.1.ppc64le",
"product_id": "libblkid-devel-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libblkid-devel-32bit-2.41.3-1.1.ppc64le",
"product": {
"name": "libblkid-devel-32bit-2.41.3-1.1.ppc64le",
"product_id": "libblkid-devel-32bit-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.41.3-1.1.ppc64le",
"product": {
"name": "libblkid-devel-static-2.41.3-1.1.ppc64le",
"product_id": "libblkid-devel-static-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libblkid1-2.41.3-1.1.ppc64le",
"product": {
"name": "libblkid1-2.41.3-1.1.ppc64le",
"product_id": "libblkid1-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libblkid1-32bit-2.41.3-1.1.ppc64le",
"product": {
"name": "libblkid1-32bit-2.41.3-1.1.ppc64le",
"product_id": "libblkid1-32bit-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.41.3-1.1.ppc64le",
"product": {
"name": "libfdisk-devel-2.41.3-1.1.ppc64le",
"product_id": "libfdisk-devel-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-32bit-2.41.3-1.1.ppc64le",
"product": {
"name": "libfdisk-devel-32bit-2.41.3-1.1.ppc64le",
"product_id": "libfdisk-devel-32bit-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.41.3-1.1.ppc64le",
"product": {
"name": "libfdisk-devel-static-2.41.3-1.1.ppc64le",
"product_id": "libfdisk-devel-static-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.41.3-1.1.ppc64le",
"product": {
"name": "libfdisk1-2.41.3-1.1.ppc64le",
"product_id": "libfdisk1-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfdisk1-32bit-2.41.3-1.1.ppc64le",
"product": {
"name": "libfdisk1-32bit-2.41.3-1.1.ppc64le",
"product_id": "libfdisk1-32bit-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.41.3-1.1.ppc64le",
"product": {
"name": "libmount-devel-2.41.3-1.1.ppc64le",
"product_id": "libmount-devel-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount-devel-32bit-2.41.3-1.1.ppc64le",
"product": {
"name": "libmount-devel-32bit-2.41.3-1.1.ppc64le",
"product_id": "libmount-devel-32bit-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.41.3-1.1.ppc64le",
"product": {
"name": "libmount-devel-static-2.41.3-1.1.ppc64le",
"product_id": "libmount-devel-static-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount1-2.41.3-1.1.ppc64le",
"product": {
"name": "libmount1-2.41.3-1.1.ppc64le",
"product_id": "libmount1-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmount1-32bit-2.41.3-1.1.ppc64le",
"product": {
"name": "libmount1-32bit-2.41.3-1.1.ppc64le",
"product_id": "libmount1-32bit-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.41.3-1.1.ppc64le",
"product": {
"name": "libsmartcols-devel-2.41.3-1.1.ppc64le",
"product_id": "libsmartcols-devel-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-32bit-2.41.3-1.1.ppc64le",
"product": {
"name": "libsmartcols-devel-32bit-2.41.3-1.1.ppc64le",
"product_id": "libsmartcols-devel-32bit-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.41.3-1.1.ppc64le",
"product": {
"name": "libsmartcols-devel-static-2.41.3-1.1.ppc64le",
"product_id": "libsmartcols-devel-static-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.41.3-1.1.ppc64le",
"product": {
"name": "libsmartcols1-2.41.3-1.1.ppc64le",
"product_id": "libsmartcols1-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsmartcols1-32bit-2.41.3-1.1.ppc64le",
"product": {
"name": "libsmartcols1-32bit-2.41.3-1.1.ppc64le",
"product_id": "libsmartcols1-32bit-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.41.3-1.1.ppc64le",
"product": {
"name": "libuuid-devel-2.41.3-1.1.ppc64le",
"product_id": "libuuid-devel-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid-devel-32bit-2.41.3-1.1.ppc64le",
"product": {
"name": "libuuid-devel-32bit-2.41.3-1.1.ppc64le",
"product_id": "libuuid-devel-32bit-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.41.3-1.1.ppc64le",
"product": {
"name": "libuuid-devel-static-2.41.3-1.1.ppc64le",
"product_id": "libuuid-devel-static-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid1-2.41.3-1.1.ppc64le",
"product": {
"name": "libuuid1-2.41.3-1.1.ppc64le",
"product_id": "libuuid1-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libuuid1-32bit-2.41.3-1.1.ppc64le",
"product": {
"name": "libuuid1-32bit-2.41.3-1.1.ppc64le",
"product_id": "libuuid1-32bit-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "util-linux-2.41.3-1.1.ppc64le",
"product": {
"name": "util-linux-2.41.3-1.1.ppc64le",
"product_id": "util-linux-2.41.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "util-linux-lang-2.41.3-1.1.ppc64le",
"product": {
"name": "util-linux-lang-2.41.3-1.1.ppc64le",
"product_id": "util-linux-lang-2.41.3-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.41.3-1.1.s390x",
"product": {
"name": "libblkid-devel-2.41.3-1.1.s390x",
"product_id": "libblkid-devel-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libblkid-devel-32bit-2.41.3-1.1.s390x",
"product": {
"name": "libblkid-devel-32bit-2.41.3-1.1.s390x",
"product_id": "libblkid-devel-32bit-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.41.3-1.1.s390x",
"product": {
"name": "libblkid-devel-static-2.41.3-1.1.s390x",
"product_id": "libblkid-devel-static-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libblkid1-2.41.3-1.1.s390x",
"product": {
"name": "libblkid1-2.41.3-1.1.s390x",
"product_id": "libblkid1-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libblkid1-32bit-2.41.3-1.1.s390x",
"product": {
"name": "libblkid1-32bit-2.41.3-1.1.s390x",
"product_id": "libblkid1-32bit-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.41.3-1.1.s390x",
"product": {
"name": "libfdisk-devel-2.41.3-1.1.s390x",
"product_id": "libfdisk-devel-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-32bit-2.41.3-1.1.s390x",
"product": {
"name": "libfdisk-devel-32bit-2.41.3-1.1.s390x",
"product_id": "libfdisk-devel-32bit-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.41.3-1.1.s390x",
"product": {
"name": "libfdisk-devel-static-2.41.3-1.1.s390x",
"product_id": "libfdisk-devel-static-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.41.3-1.1.s390x",
"product": {
"name": "libfdisk1-2.41.3-1.1.s390x",
"product_id": "libfdisk1-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libfdisk1-32bit-2.41.3-1.1.s390x",
"product": {
"name": "libfdisk1-32bit-2.41.3-1.1.s390x",
"product_id": "libfdisk1-32bit-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.41.3-1.1.s390x",
"product": {
"name": "libmount-devel-2.41.3-1.1.s390x",
"product_id": "libmount-devel-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount-devel-32bit-2.41.3-1.1.s390x",
"product": {
"name": "libmount-devel-32bit-2.41.3-1.1.s390x",
"product_id": "libmount-devel-32bit-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.41.3-1.1.s390x",
"product": {
"name": "libmount-devel-static-2.41.3-1.1.s390x",
"product_id": "libmount-devel-static-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount1-2.41.3-1.1.s390x",
"product": {
"name": "libmount1-2.41.3-1.1.s390x",
"product_id": "libmount1-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libmount1-32bit-2.41.3-1.1.s390x",
"product": {
"name": "libmount1-32bit-2.41.3-1.1.s390x",
"product_id": "libmount1-32bit-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.41.3-1.1.s390x",
"product": {
"name": "libsmartcols-devel-2.41.3-1.1.s390x",
"product_id": "libsmartcols-devel-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-32bit-2.41.3-1.1.s390x",
"product": {
"name": "libsmartcols-devel-32bit-2.41.3-1.1.s390x",
"product_id": "libsmartcols-devel-32bit-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.41.3-1.1.s390x",
"product": {
"name": "libsmartcols-devel-static-2.41.3-1.1.s390x",
"product_id": "libsmartcols-devel-static-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.41.3-1.1.s390x",
"product": {
"name": "libsmartcols1-2.41.3-1.1.s390x",
"product_id": "libsmartcols1-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libsmartcols1-32bit-2.41.3-1.1.s390x",
"product": {
"name": "libsmartcols1-32bit-2.41.3-1.1.s390x",
"product_id": "libsmartcols1-32bit-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.41.3-1.1.s390x",
"product": {
"name": "libuuid-devel-2.41.3-1.1.s390x",
"product_id": "libuuid-devel-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid-devel-32bit-2.41.3-1.1.s390x",
"product": {
"name": "libuuid-devel-32bit-2.41.3-1.1.s390x",
"product_id": "libuuid-devel-32bit-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.41.3-1.1.s390x",
"product": {
"name": "libuuid-devel-static-2.41.3-1.1.s390x",
"product_id": "libuuid-devel-static-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid1-2.41.3-1.1.s390x",
"product": {
"name": "libuuid1-2.41.3-1.1.s390x",
"product_id": "libuuid1-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libuuid1-32bit-2.41.3-1.1.s390x",
"product": {
"name": "libuuid1-32bit-2.41.3-1.1.s390x",
"product_id": "libuuid1-32bit-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "util-linux-2.41.3-1.1.s390x",
"product": {
"name": "util-linux-2.41.3-1.1.s390x",
"product_id": "util-linux-2.41.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "util-linux-lang-2.41.3-1.1.s390x",
"product": {
"name": "util-linux-lang-2.41.3-1.1.s390x",
"product_id": "util-linux-lang-2.41.3-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libblkid-devel-2.41.3-1.1.x86_64",
"product": {
"name": "libblkid-devel-2.41.3-1.1.x86_64",
"product_id": "libblkid-devel-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-32bit-2.41.3-1.1.x86_64",
"product": {
"name": "libblkid-devel-32bit-2.41.3-1.1.x86_64",
"product_id": "libblkid-devel-32bit-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid-devel-static-2.41.3-1.1.x86_64",
"product": {
"name": "libblkid-devel-static-2.41.3-1.1.x86_64",
"product_id": "libblkid-devel-static-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid1-2.41.3-1.1.x86_64",
"product": {
"name": "libblkid1-2.41.3-1.1.x86_64",
"product_id": "libblkid1-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libblkid1-32bit-2.41.3-1.1.x86_64",
"product": {
"name": "libblkid1-32bit-2.41.3-1.1.x86_64",
"product_id": "libblkid1-32bit-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-2.41.3-1.1.x86_64",
"product": {
"name": "libfdisk-devel-2.41.3-1.1.x86_64",
"product_id": "libfdisk-devel-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-32bit-2.41.3-1.1.x86_64",
"product": {
"name": "libfdisk-devel-32bit-2.41.3-1.1.x86_64",
"product_id": "libfdisk-devel-32bit-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk-devel-static-2.41.3-1.1.x86_64",
"product": {
"name": "libfdisk-devel-static-2.41.3-1.1.x86_64",
"product_id": "libfdisk-devel-static-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk1-2.41.3-1.1.x86_64",
"product": {
"name": "libfdisk1-2.41.3-1.1.x86_64",
"product_id": "libfdisk1-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfdisk1-32bit-2.41.3-1.1.x86_64",
"product": {
"name": "libfdisk1-32bit-2.41.3-1.1.x86_64",
"product_id": "libfdisk1-32bit-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-2.41.3-1.1.x86_64",
"product": {
"name": "libmount-devel-2.41.3-1.1.x86_64",
"product_id": "libmount-devel-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-32bit-2.41.3-1.1.x86_64",
"product": {
"name": "libmount-devel-32bit-2.41.3-1.1.x86_64",
"product_id": "libmount-devel-32bit-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount-devel-static-2.41.3-1.1.x86_64",
"product": {
"name": "libmount-devel-static-2.41.3-1.1.x86_64",
"product_id": "libmount-devel-static-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount1-2.41.3-1.1.x86_64",
"product": {
"name": "libmount1-2.41.3-1.1.x86_64",
"product_id": "libmount1-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmount1-32bit-2.41.3-1.1.x86_64",
"product": {
"name": "libmount1-32bit-2.41.3-1.1.x86_64",
"product_id": "libmount1-32bit-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-2.41.3-1.1.x86_64",
"product": {
"name": "libsmartcols-devel-2.41.3-1.1.x86_64",
"product_id": "libsmartcols-devel-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-32bit-2.41.3-1.1.x86_64",
"product": {
"name": "libsmartcols-devel-32bit-2.41.3-1.1.x86_64",
"product_id": "libsmartcols-devel-32bit-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols-devel-static-2.41.3-1.1.x86_64",
"product": {
"name": "libsmartcols-devel-static-2.41.3-1.1.x86_64",
"product_id": "libsmartcols-devel-static-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-2.41.3-1.1.x86_64",
"product": {
"name": "libsmartcols1-2.41.3-1.1.x86_64",
"product_id": "libsmartcols1-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsmartcols1-32bit-2.41.3-1.1.x86_64",
"product": {
"name": "libsmartcols1-32bit-2.41.3-1.1.x86_64",
"product_id": "libsmartcols1-32bit-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-2.41.3-1.1.x86_64",
"product": {
"name": "libuuid-devel-2.41.3-1.1.x86_64",
"product_id": "libuuid-devel-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-32bit-2.41.3-1.1.x86_64",
"product": {
"name": "libuuid-devel-32bit-2.41.3-1.1.x86_64",
"product_id": "libuuid-devel-32bit-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid-devel-static-2.41.3-1.1.x86_64",
"product": {
"name": "libuuid-devel-static-2.41.3-1.1.x86_64",
"product_id": "libuuid-devel-static-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid1-2.41.3-1.1.x86_64",
"product": {
"name": "libuuid1-2.41.3-1.1.x86_64",
"product_id": "libuuid1-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libuuid1-32bit-2.41.3-1.1.x86_64",
"product": {
"name": "libuuid1-32bit-2.41.3-1.1.x86_64",
"product_id": "libuuid1-32bit-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "util-linux-2.41.3-1.1.x86_64",
"product": {
"name": "util-linux-2.41.3-1.1.x86_64",
"product_id": "util-linux-2.41.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "util-linux-lang-2.41.3-1.1.x86_64",
"product": {
"name": "util-linux-lang-2.41.3-1.1.x86_64",
"product_id": "util-linux-lang-2.41.3-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid-devel-2.41.3-1.1.aarch64"
},
"product_reference": "libblkid-devel-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid-devel-2.41.3-1.1.ppc64le"
},
"product_reference": "libblkid-devel-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid-devel-2.41.3-1.1.s390x"
},
"product_reference": "libblkid-devel-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid-devel-2.41.3-1.1.x86_64"
},
"product_reference": "libblkid-devel-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-32bit-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid-devel-32bit-2.41.3-1.1.aarch64"
},
"product_reference": "libblkid-devel-32bit-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-32bit-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid-devel-32bit-2.41.3-1.1.ppc64le"
},
"product_reference": "libblkid-devel-32bit-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-32bit-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid-devel-32bit-2.41.3-1.1.s390x"
},
"product_reference": "libblkid-devel-32bit-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-32bit-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid-devel-32bit-2.41.3-1.1.x86_64"
},
"product_reference": "libblkid-devel-32bit-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-static-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid-devel-static-2.41.3-1.1.aarch64"
},
"product_reference": "libblkid-devel-static-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-static-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid-devel-static-2.41.3-1.1.ppc64le"
},
"product_reference": "libblkid-devel-static-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-static-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid-devel-static-2.41.3-1.1.s390x"
},
"product_reference": "libblkid-devel-static-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid-devel-static-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid-devel-static-2.41.3-1.1.x86_64"
},
"product_reference": "libblkid-devel-static-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid1-2.41.3-1.1.aarch64"
},
"product_reference": "libblkid1-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid1-2.41.3-1.1.ppc64le"
},
"product_reference": "libblkid1-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid1-2.41.3-1.1.s390x"
},
"product_reference": "libblkid1-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid1-2.41.3-1.1.x86_64"
},
"product_reference": "libblkid1-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-32bit-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid1-32bit-2.41.3-1.1.aarch64"
},
"product_reference": "libblkid1-32bit-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-32bit-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid1-32bit-2.41.3-1.1.ppc64le"
},
"product_reference": "libblkid1-32bit-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-32bit-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid1-32bit-2.41.3-1.1.s390x"
},
"product_reference": "libblkid1-32bit-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libblkid1-32bit-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libblkid1-32bit-2.41.3-1.1.x86_64"
},
"product_reference": "libblkid1-32bit-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk-devel-2.41.3-1.1.aarch64"
},
"product_reference": "libfdisk-devel-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk-devel-2.41.3-1.1.ppc64le"
},
"product_reference": "libfdisk-devel-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk-devel-2.41.3-1.1.s390x"
},
"product_reference": "libfdisk-devel-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk-devel-2.41.3-1.1.x86_64"
},
"product_reference": "libfdisk-devel-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-32bit-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk-devel-32bit-2.41.3-1.1.aarch64"
},
"product_reference": "libfdisk-devel-32bit-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-32bit-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk-devel-32bit-2.41.3-1.1.ppc64le"
},
"product_reference": "libfdisk-devel-32bit-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-32bit-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk-devel-32bit-2.41.3-1.1.s390x"
},
"product_reference": "libfdisk-devel-32bit-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-32bit-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk-devel-32bit-2.41.3-1.1.x86_64"
},
"product_reference": "libfdisk-devel-32bit-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-static-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk-devel-static-2.41.3-1.1.aarch64"
},
"product_reference": "libfdisk-devel-static-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-static-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk-devel-static-2.41.3-1.1.ppc64le"
},
"product_reference": "libfdisk-devel-static-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-static-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk-devel-static-2.41.3-1.1.s390x"
},
"product_reference": "libfdisk-devel-static-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk-devel-static-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk-devel-static-2.41.3-1.1.x86_64"
},
"product_reference": "libfdisk-devel-static-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk1-2.41.3-1.1.aarch64"
},
"product_reference": "libfdisk1-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk1-2.41.3-1.1.ppc64le"
},
"product_reference": "libfdisk1-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk1-2.41.3-1.1.s390x"
},
"product_reference": "libfdisk1-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk1-2.41.3-1.1.x86_64"
},
"product_reference": "libfdisk1-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-32bit-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk1-32bit-2.41.3-1.1.aarch64"
},
"product_reference": "libfdisk1-32bit-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-32bit-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk1-32bit-2.41.3-1.1.ppc64le"
},
"product_reference": "libfdisk1-32bit-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-32bit-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk1-32bit-2.41.3-1.1.s390x"
},
"product_reference": "libfdisk1-32bit-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfdisk1-32bit-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfdisk1-32bit-2.41.3-1.1.x86_64"
},
"product_reference": "libfdisk1-32bit-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount-devel-2.41.3-1.1.aarch64"
},
"product_reference": "libmount-devel-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount-devel-2.41.3-1.1.ppc64le"
},
"product_reference": "libmount-devel-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount-devel-2.41.3-1.1.s390x"
},
"product_reference": "libmount-devel-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount-devel-2.41.3-1.1.x86_64"
},
"product_reference": "libmount-devel-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-32bit-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount-devel-32bit-2.41.3-1.1.aarch64"
},
"product_reference": "libmount-devel-32bit-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-32bit-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount-devel-32bit-2.41.3-1.1.ppc64le"
},
"product_reference": "libmount-devel-32bit-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-32bit-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount-devel-32bit-2.41.3-1.1.s390x"
},
"product_reference": "libmount-devel-32bit-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-32bit-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount-devel-32bit-2.41.3-1.1.x86_64"
},
"product_reference": "libmount-devel-32bit-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-static-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount-devel-static-2.41.3-1.1.aarch64"
},
"product_reference": "libmount-devel-static-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-static-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount-devel-static-2.41.3-1.1.ppc64le"
},
"product_reference": "libmount-devel-static-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-static-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount-devel-static-2.41.3-1.1.s390x"
},
"product_reference": "libmount-devel-static-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount-devel-static-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount-devel-static-2.41.3-1.1.x86_64"
},
"product_reference": "libmount-devel-static-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount1-2.41.3-1.1.aarch64"
},
"product_reference": "libmount1-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount1-2.41.3-1.1.ppc64le"
},
"product_reference": "libmount1-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount1-2.41.3-1.1.s390x"
},
"product_reference": "libmount1-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount1-2.41.3-1.1.x86_64"
},
"product_reference": "libmount1-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-32bit-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount1-32bit-2.41.3-1.1.aarch64"
},
"product_reference": "libmount1-32bit-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-32bit-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount1-32bit-2.41.3-1.1.ppc64le"
},
"product_reference": "libmount1-32bit-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-32bit-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount1-32bit-2.41.3-1.1.s390x"
},
"product_reference": "libmount1-32bit-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmount1-32bit-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmount1-32bit-2.41.3-1.1.x86_64"
},
"product_reference": "libmount1-32bit-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols-devel-2.41.3-1.1.aarch64"
},
"product_reference": "libsmartcols-devel-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols-devel-2.41.3-1.1.ppc64le"
},
"product_reference": "libsmartcols-devel-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols-devel-2.41.3-1.1.s390x"
},
"product_reference": "libsmartcols-devel-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols-devel-2.41.3-1.1.x86_64"
},
"product_reference": "libsmartcols-devel-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-32bit-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols-devel-32bit-2.41.3-1.1.aarch64"
},
"product_reference": "libsmartcols-devel-32bit-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-32bit-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols-devel-32bit-2.41.3-1.1.ppc64le"
},
"product_reference": "libsmartcols-devel-32bit-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-32bit-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols-devel-32bit-2.41.3-1.1.s390x"
},
"product_reference": "libsmartcols-devel-32bit-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-32bit-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols-devel-32bit-2.41.3-1.1.x86_64"
},
"product_reference": "libsmartcols-devel-32bit-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-static-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols-devel-static-2.41.3-1.1.aarch64"
},
"product_reference": "libsmartcols-devel-static-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-static-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols-devel-static-2.41.3-1.1.ppc64le"
},
"product_reference": "libsmartcols-devel-static-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-static-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols-devel-static-2.41.3-1.1.s390x"
},
"product_reference": "libsmartcols-devel-static-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols-devel-static-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols-devel-static-2.41.3-1.1.x86_64"
},
"product_reference": "libsmartcols-devel-static-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols1-2.41.3-1.1.aarch64"
},
"product_reference": "libsmartcols1-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols1-2.41.3-1.1.ppc64le"
},
"product_reference": "libsmartcols1-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols1-2.41.3-1.1.s390x"
},
"product_reference": "libsmartcols1-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols1-2.41.3-1.1.x86_64"
},
"product_reference": "libsmartcols1-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-32bit-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols1-32bit-2.41.3-1.1.aarch64"
},
"product_reference": "libsmartcols1-32bit-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-32bit-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols1-32bit-2.41.3-1.1.ppc64le"
},
"product_reference": "libsmartcols1-32bit-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-32bit-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols1-32bit-2.41.3-1.1.s390x"
},
"product_reference": "libsmartcols1-32bit-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsmartcols1-32bit-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsmartcols1-32bit-2.41.3-1.1.x86_64"
},
"product_reference": "libsmartcols1-32bit-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid-devel-2.41.3-1.1.aarch64"
},
"product_reference": "libuuid-devel-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid-devel-2.41.3-1.1.ppc64le"
},
"product_reference": "libuuid-devel-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid-devel-2.41.3-1.1.s390x"
},
"product_reference": "libuuid-devel-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid-devel-2.41.3-1.1.x86_64"
},
"product_reference": "libuuid-devel-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-32bit-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid-devel-32bit-2.41.3-1.1.aarch64"
},
"product_reference": "libuuid-devel-32bit-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-32bit-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid-devel-32bit-2.41.3-1.1.ppc64le"
},
"product_reference": "libuuid-devel-32bit-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-32bit-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid-devel-32bit-2.41.3-1.1.s390x"
},
"product_reference": "libuuid-devel-32bit-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-32bit-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid-devel-32bit-2.41.3-1.1.x86_64"
},
"product_reference": "libuuid-devel-32bit-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-static-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid-devel-static-2.41.3-1.1.aarch64"
},
"product_reference": "libuuid-devel-static-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-static-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid-devel-static-2.41.3-1.1.ppc64le"
},
"product_reference": "libuuid-devel-static-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-static-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid-devel-static-2.41.3-1.1.s390x"
},
"product_reference": "libuuid-devel-static-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid-devel-static-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid-devel-static-2.41.3-1.1.x86_64"
},
"product_reference": "libuuid-devel-static-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid1-2.41.3-1.1.aarch64"
},
"product_reference": "libuuid1-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid1-2.41.3-1.1.ppc64le"
},
"product_reference": "libuuid1-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid1-2.41.3-1.1.s390x"
},
"product_reference": "libuuid1-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid1-2.41.3-1.1.x86_64"
},
"product_reference": "libuuid1-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-32bit-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid1-32bit-2.41.3-1.1.aarch64"
},
"product_reference": "libuuid1-32bit-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-32bit-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid1-32bit-2.41.3-1.1.ppc64le"
},
"product_reference": "libuuid1-32bit-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-32bit-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid1-32bit-2.41.3-1.1.s390x"
},
"product_reference": "libuuid1-32bit-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libuuid1-32bit-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libuuid1-32bit-2.41.3-1.1.x86_64"
},
"product_reference": "libuuid1-32bit-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:util-linux-2.41.3-1.1.aarch64"
},
"product_reference": "util-linux-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:util-linux-2.41.3-1.1.ppc64le"
},
"product_reference": "util-linux-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:util-linux-2.41.3-1.1.s390x"
},
"product_reference": "util-linux-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:util-linux-2.41.3-1.1.x86_64"
},
"product_reference": "util-linux-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-lang-2.41.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:util-linux-lang-2.41.3-1.1.aarch64"
},
"product_reference": "util-linux-lang-2.41.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-lang-2.41.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:util-linux-lang-2.41.3-1.1.ppc64le"
},
"product_reference": "util-linux-lang-2.41.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-lang-2.41.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:util-linux-lang-2.41.3-1.1.s390x"
},
"product_reference": "util-linux-lang-2.41.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "util-linux-lang-2.41.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:util-linux-lang-2.41.3-1.1.x86_64"
},
"product_reference": "util-linux-lang-2.41.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14104"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libblkid-devel-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libblkid-devel-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libblkid-devel-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libblkid-devel-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libblkid-devel-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libblkid-devel-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libblkid-devel-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libblkid-devel-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libblkid-devel-static-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libblkid-devel-static-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libblkid-devel-static-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libblkid-devel-static-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libblkid1-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libblkid1-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libblkid1-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libblkid1-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libblkid1-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libblkid1-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libblkid1-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libblkid1-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libfdisk-devel-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libfdisk-devel-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libfdisk-devel-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libfdisk-devel-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libfdisk-devel-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libfdisk-devel-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libfdisk-devel-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libfdisk-devel-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libfdisk-devel-static-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libfdisk-devel-static-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libfdisk-devel-static-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libfdisk-devel-static-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libfdisk1-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libfdisk1-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libfdisk1-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libfdisk1-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libfdisk1-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libfdisk1-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libfdisk1-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libfdisk1-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libmount-devel-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libmount-devel-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libmount-devel-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libmount-devel-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libmount-devel-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libmount-devel-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libmount-devel-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libmount-devel-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libmount-devel-static-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libmount-devel-static-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libmount-devel-static-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libmount-devel-static-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libmount1-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libmount1-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libmount1-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libmount1-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libmount1-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libmount1-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libmount1-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libmount1-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libsmartcols-devel-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libsmartcols-devel-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsmartcols-devel-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libsmartcols-devel-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libsmartcols-devel-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libsmartcols-devel-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsmartcols-devel-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libsmartcols-devel-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libsmartcols-devel-static-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libsmartcols-devel-static-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsmartcols-devel-static-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libsmartcols-devel-static-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libsmartcols1-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libsmartcols1-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsmartcols1-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libsmartcols1-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libsmartcols1-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libsmartcols1-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsmartcols1-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libsmartcols1-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libuuid-devel-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libuuid-devel-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libuuid-devel-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libuuid-devel-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libuuid-devel-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libuuid-devel-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libuuid-devel-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libuuid-devel-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libuuid-devel-static-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libuuid-devel-static-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libuuid-devel-static-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libuuid-devel-static-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libuuid1-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libuuid1-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libuuid1-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libuuid1-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libuuid1-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libuuid1-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libuuid1-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libuuid1-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:util-linux-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:util-linux-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:util-linux-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:util-linux-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:util-linux-lang-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:util-linux-lang-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:util-linux-lang-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:util-linux-lang-2.41.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14104",
"url": "https://www.suse.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "SUSE Bug 1254666 for CVE-2025-14104",
"url": "https://bugzilla.suse.com/1254666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libblkid-devel-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libblkid-devel-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libblkid-devel-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libblkid-devel-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libblkid-devel-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libblkid-devel-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libblkid-devel-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libblkid-devel-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libblkid-devel-static-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libblkid-devel-static-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libblkid-devel-static-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libblkid-devel-static-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libblkid1-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libblkid1-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libblkid1-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libblkid1-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libblkid1-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libblkid1-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libblkid1-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libblkid1-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libfdisk-devel-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libfdisk-devel-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libfdisk-devel-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libfdisk-devel-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libfdisk-devel-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libfdisk-devel-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libfdisk-devel-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libfdisk-devel-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libfdisk-devel-static-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libfdisk-devel-static-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libfdisk-devel-static-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libfdisk-devel-static-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libfdisk1-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libfdisk1-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libfdisk1-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libfdisk1-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libfdisk1-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libfdisk1-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libfdisk1-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libfdisk1-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libmount-devel-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libmount-devel-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libmount-devel-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libmount-devel-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libmount-devel-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libmount-devel-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libmount-devel-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libmount-devel-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libmount-devel-static-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libmount-devel-static-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libmount-devel-static-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libmount-devel-static-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libmount1-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libmount1-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libmount1-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libmount1-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libmount1-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libmount1-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libmount1-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libmount1-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libsmartcols-devel-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libsmartcols-devel-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsmartcols-devel-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libsmartcols-devel-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libsmartcols-devel-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libsmartcols-devel-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsmartcols-devel-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libsmartcols-devel-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libsmartcols-devel-static-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libsmartcols-devel-static-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsmartcols-devel-static-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libsmartcols-devel-static-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libsmartcols1-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libsmartcols1-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsmartcols1-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libsmartcols1-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libsmartcols1-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libsmartcols1-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsmartcols1-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libsmartcols1-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libuuid-devel-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libuuid-devel-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libuuid-devel-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libuuid-devel-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libuuid-devel-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libuuid-devel-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libuuid-devel-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libuuid-devel-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libuuid-devel-static-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libuuid-devel-static-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libuuid-devel-static-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libuuid-devel-static-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libuuid1-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libuuid1-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libuuid1-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libuuid1-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libuuid1-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libuuid1-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libuuid1-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libuuid1-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:util-linux-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:util-linux-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:util-linux-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:util-linux-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:util-linux-lang-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:util-linux-lang-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:util-linux-lang-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:util-linux-lang-2.41.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libblkid-devel-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libblkid-devel-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libblkid-devel-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libblkid-devel-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libblkid-devel-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libblkid-devel-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libblkid-devel-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libblkid-devel-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libblkid-devel-static-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libblkid-devel-static-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libblkid-devel-static-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libblkid-devel-static-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libblkid1-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libblkid1-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libblkid1-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libblkid1-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libblkid1-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libblkid1-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libblkid1-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libblkid1-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libfdisk-devel-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libfdisk-devel-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libfdisk-devel-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libfdisk-devel-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libfdisk-devel-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libfdisk-devel-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libfdisk-devel-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libfdisk-devel-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libfdisk-devel-static-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libfdisk-devel-static-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libfdisk-devel-static-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libfdisk-devel-static-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libfdisk1-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libfdisk1-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libfdisk1-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libfdisk1-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libfdisk1-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libfdisk1-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libfdisk1-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libfdisk1-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libmount-devel-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libmount-devel-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libmount-devel-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libmount-devel-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libmount-devel-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libmount-devel-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libmount-devel-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libmount-devel-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libmount-devel-static-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libmount-devel-static-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libmount-devel-static-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libmount-devel-static-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libmount1-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libmount1-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libmount1-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libmount1-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libmount1-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libmount1-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libmount1-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libmount1-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libsmartcols-devel-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libsmartcols-devel-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsmartcols-devel-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libsmartcols-devel-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libsmartcols-devel-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libsmartcols-devel-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsmartcols-devel-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libsmartcols-devel-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libsmartcols-devel-static-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libsmartcols-devel-static-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsmartcols-devel-static-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libsmartcols-devel-static-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libsmartcols1-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libsmartcols1-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsmartcols1-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libsmartcols1-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libsmartcols1-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libsmartcols1-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsmartcols1-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libsmartcols1-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libuuid-devel-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libuuid-devel-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libuuid-devel-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libuuid-devel-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libuuid-devel-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libuuid-devel-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libuuid-devel-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libuuid-devel-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libuuid-devel-static-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libuuid-devel-static-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libuuid-devel-static-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libuuid-devel-static-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libuuid1-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libuuid1-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libuuid1-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libuuid1-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:libuuid1-32bit-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:libuuid1-32bit-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:libuuid1-32bit-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:libuuid1-32bit-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:util-linux-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:util-linux-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:util-linux-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:util-linux-2.41.3-1.1.x86_64",
"openSUSE Tumbleweed:util-linux-lang-2.41.3-1.1.aarch64",
"openSUSE Tumbleweed:util-linux-lang-2.41.3-1.1.ppc64le",
"openSUSE Tumbleweed:util-linux-lang-2.41.3-1.1.s390x",
"openSUSE Tumbleweed:util-linux-lang-2.41.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-19T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-14104"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…