Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-5222 (GCVE-0-2025-5222)
Vulnerability from cvelistv5
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
| URL | Tags | ||
|---|---|---|---|
|  | |||
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Version: 0   ≤ | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 
 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-5222",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-28T13:49:29.931272Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-28T13:49:36.203Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-06-15T23:02:56.243Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/06/msg00015.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://unicode-org.atlassian.net/",
          "defaultStatus": "unaffected",
          "packageName": "icu",
          "versions": [
            {
              "lessThan": "78.1",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:10.0"
          ],
          "defaultStatus": "affected",
          "packageName": "icu",
          "product": "Red Hat Enterprise Linux 10",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:74.2-5.el10_0",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:enterprise_linux:9::appstream",
            "cpe:/o:redhat:enterprise_linux:9::baseos"
          ],
          "defaultStatus": "affected",
          "packageName": "icu",
          "product": "Red Hat Enterprise Linux 9",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:67.1-10.el9_6",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:enterprise_linux:9::appstream",
            "cpe:/o:redhat:enterprise_linux:9::baseos"
          ],
          "defaultStatus": "affected",
          "packageName": "icu",
          "product": "Red Hat Enterprise Linux 9",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:67.1-10.el9_6",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:rhel_e4s:9.0::appstream",
            "cpe:/o:redhat:rhel_e4s:9.0::baseos"
          ],
          "defaultStatus": "affected",
          "packageName": "icu",
          "product": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:67.1-10.el9_0",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:rhel_e4s:9.2::appstream",
            "cpe:/o:redhat:rhel_e4s:9.2::baseos"
          ],
          "defaultStatus": "affected",
          "packageName": "icu",
          "product": "Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:67.1-10.el9_2",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:rhel_eus:9.4::appstream",
            "cpe:/o:redhat:rhel_eus:9.4::baseos"
          ],
          "defaultStatus": "affected",
          "packageName": "icu",
          "product": "Red Hat Enterprise Linux 9.4 Extended Update Support",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:67.1-10.el9_4",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:6"
          ],
          "defaultStatus": "unknown",
          "packageName": "icu",
          "product": "Red Hat Enterprise Linux 6",
          "vendor": "Red Hat"
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:7"
          ],
          "defaultStatus": "unknown",
          "packageName": "icu",
          "product": "Red Hat Enterprise Linux 7",
          "vendor": "Red Hat"
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:8"
          ],
          "defaultStatus": "affected",
          "packageName": "icu",
          "product": "Red Hat Enterprise Linux 8",
          "vendor": "Red Hat"
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:8"
          ],
          "defaultStatus": "affected",
          "packageName": "mingw-icu",
          "product": "Red Hat Enterprise Linux 8",
          "vendor": "Red Hat"
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:openshift:4"
          ],
          "defaultStatus": "affected",
          "packageName": "rhcos",
          "product": "Red Hat OpenShift Container Platform 4",
          "vendor": "Red Hat"
        }
      ],
      "datePublic": "2024-11-14T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the \u0027subtag\u0027 struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Moderate"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-120",
              "description": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-31T04:59:35.421Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2025:11888",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2025:11888"
        },
        {
          "name": "RHSA-2025:12083",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2025:12083"
        },
        {
          "name": "RHSA-2025:12331",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2025:12331"
        },
        {
          "name": "RHSA-2025:12332",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2025:12332"
        },
        {
          "name": "RHSA-2025:12333",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2025:12333"
        },
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-5222"
        },
        {
          "name": "RHBZ#2368600",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368600"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-05-26T13:39:54.361000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2024-11-14T00:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Icu: stack buffer overflow in the srbroot::addtag function",
      "workarounds": [
        {
          "lang": "en",
          "value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
        }
      ],
      "x_redhatCweChain": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2025-5222",
    "datePublished": "2025-05-27T20:51:50.958Z",
    "dateReserved": "2025-05-26T14:41:58.427Z",
    "dateUpdated": "2025-07-31T04:59:35.421Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-5222\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2025-05-27T21:15:23.030\",\"lastModified\":\"2025-08-08T14:55:36.747\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the \u0027subtag\u0027 struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 un desbordamiento del b\u00fafer de pila en componentes internacionales para Unicode (ICU). Al ejecutar el binario genrb, la estructura \u0027subtag\u0027 se desbord\u00f3 en la funci\u00f3n SRBRoot::addTag. Este problema puede provocar corrupci\u00f3n de memoria y la ejecuci\u00f3n local de c\u00f3digo arbitrario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:unicode:international_components_for_unicode:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"78.1\",\"matchCriteriaId\":\"CA91C946-4A22-4445-9481-2FFFE43B78AB\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2025:11888\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:12083\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:12331\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:12332\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:12333\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2025-5222\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2368600\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/06/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://lists.debian.org/debian-lts-announce/2025/06/msg00015.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-06-15T23:02:56.243Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-5222\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-28T13:49:29.931272Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-28T13:49:33.392Z\"}}], \"cna\": {\"title\": \"Icu: stack buffer overflow in the srbroot::addtag function\", \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Moderate\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"78.1\", \"versionType\": \"semver\"}], \"packageName\": \"icu\", \"collectionURL\": \"https://unicode-org.atlassian.net/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10.0\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:74.2-5.el10_0\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"icu\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\", \"cpe:/o:redhat:enterprise_linux:9::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:67.1-10.el9_6\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"icu\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\", \"cpe:/o:redhat:enterprise_linux:9::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:67.1-10.el9_6\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"icu\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:9.0::appstream\", \"cpe:/o:redhat:rhel_e4s:9.0::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:67.1-10.el9_0\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"icu\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:9.2::appstream\", \"cpe:/o:redhat:rhel_e4s:9.2::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:67.1-10.el9_2\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"icu\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:9.4::appstream\", \"cpe:/o:redhat:rhel_eus:9.4::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.4 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:67.1-10.el9_4\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"icu\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"icu\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"packageName\": \"icu\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"icu\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"mingw-icu\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4\", \"packageName\": \"rhcos\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-05-26T13:39:54.361000+00:00\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2024-11-14T00:00:00+00:00\", \"value\": \"Made public.\"}], \"datePublic\": \"2024-11-14T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2025:11888\", \"name\": \"RHSA-2025:11888\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:12083\", \"name\": \"RHSA-2025:12083\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:12331\", \"name\": \"RHSA-2025:12331\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:12332\", \"name\": \"RHSA-2025:12332\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:12333\", \"name\": \"RHSA-2025:12333\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2025-5222\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2368600\", \"name\": \"RHBZ#2368600\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the \u0027subtag\u0027 struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-120\", \"description\": \"Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2025-07-31T04:59:35.421Z\"}, \"x_redhatCweChain\": \"CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)\"}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-5222\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-31T04:59:35.421Z\", \"dateReserved\": \"2025-05-26T14:41:58.427Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2025-05-27T20:51:50.958Z\", \"assignerShortName\": \"redhat\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  opensuse-su-2025:15230-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "icu-77.1-3.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the icu-77.1-3.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2025-15230",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15230-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-5222 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-5222/"
      }
    ],
    "title": "icu-77.1-3.1 on GA media",
    "tracking": {
      "current_release_date": "2025-07-03T00:00:00Z",
      "generator": {
        "date": "2025-07-03T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2025:15230-1",
      "initial_release_date": "2025-07-03T00:00:00Z",
      "revision_history": [
        {
          "date": "2025-07-03T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icu-77.1-3.1.aarch64",
                "product": {
                  "name": "icu-77.1-3.1.aarch64",
                  "product_id": "icu-77.1-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-77.1-3.1.aarch64",
                "product": {
                  "name": "libicu-devel-77.1-3.1.aarch64",
                  "product_id": "libicu-devel-77.1-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-32bit-77.1-3.1.aarch64",
                "product": {
                  "name": "libicu-devel-32bit-77.1-3.1.aarch64",
                  "product_id": "libicu-devel-32bit-77.1-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libicu-doc-77.1-3.1.aarch64",
                "product": {
                  "name": "libicu-doc-77.1-3.1.aarch64",
                  "product_id": "libicu-doc-77.1-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libicu77-77.1-3.1.aarch64",
                "product": {
                  "name": "libicu77-77.1-3.1.aarch64",
                  "product_id": "libicu77-77.1-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libicu77-32bit-77.1-3.1.aarch64",
                "product": {
                  "name": "libicu77-32bit-77.1-3.1.aarch64",
                  "product_id": "libicu77-32bit-77.1-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libicu77-bedata-77.1-3.1.aarch64",
                "product": {
                  "name": "libicu77-bedata-77.1-3.1.aarch64",
                  "product_id": "libicu77-bedata-77.1-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libicu77-ledata-77.1-3.1.aarch64",
                "product": {
                  "name": "libicu77-ledata-77.1-3.1.aarch64",
                  "product_id": "libicu77-ledata-77.1-3.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icu-77.1-3.1.ppc64le",
                "product": {
                  "name": "icu-77.1-3.1.ppc64le",
                  "product_id": "icu-77.1-3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-77.1-3.1.ppc64le",
                "product": {
                  "name": "libicu-devel-77.1-3.1.ppc64le",
                  "product_id": "libicu-devel-77.1-3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-32bit-77.1-3.1.ppc64le",
                "product": {
                  "name": "libicu-devel-32bit-77.1-3.1.ppc64le",
                  "product_id": "libicu-devel-32bit-77.1-3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libicu-doc-77.1-3.1.ppc64le",
                "product": {
                  "name": "libicu-doc-77.1-3.1.ppc64le",
                  "product_id": "libicu-doc-77.1-3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libicu77-77.1-3.1.ppc64le",
                "product": {
                  "name": "libicu77-77.1-3.1.ppc64le",
                  "product_id": "libicu77-77.1-3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libicu77-32bit-77.1-3.1.ppc64le",
                "product": {
                  "name": "libicu77-32bit-77.1-3.1.ppc64le",
                  "product_id": "libicu77-32bit-77.1-3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libicu77-bedata-77.1-3.1.ppc64le",
                "product": {
                  "name": "libicu77-bedata-77.1-3.1.ppc64le",
                  "product_id": "libicu77-bedata-77.1-3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libicu77-ledata-77.1-3.1.ppc64le",
                "product": {
                  "name": "libicu77-ledata-77.1-3.1.ppc64le",
                  "product_id": "libicu77-ledata-77.1-3.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icu-77.1-3.1.s390x",
                "product": {
                  "name": "icu-77.1-3.1.s390x",
                  "product_id": "icu-77.1-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-77.1-3.1.s390x",
                "product": {
                  "name": "libicu-devel-77.1-3.1.s390x",
                  "product_id": "libicu-devel-77.1-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-32bit-77.1-3.1.s390x",
                "product": {
                  "name": "libicu-devel-32bit-77.1-3.1.s390x",
                  "product_id": "libicu-devel-32bit-77.1-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libicu-doc-77.1-3.1.s390x",
                "product": {
                  "name": "libicu-doc-77.1-3.1.s390x",
                  "product_id": "libicu-doc-77.1-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libicu77-77.1-3.1.s390x",
                "product": {
                  "name": "libicu77-77.1-3.1.s390x",
                  "product_id": "libicu77-77.1-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libicu77-32bit-77.1-3.1.s390x",
                "product": {
                  "name": "libicu77-32bit-77.1-3.1.s390x",
                  "product_id": "libicu77-32bit-77.1-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libicu77-bedata-77.1-3.1.s390x",
                "product": {
                  "name": "libicu77-bedata-77.1-3.1.s390x",
                  "product_id": "libicu77-bedata-77.1-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libicu77-ledata-77.1-3.1.s390x",
                "product": {
                  "name": "libicu77-ledata-77.1-3.1.s390x",
                  "product_id": "libicu77-ledata-77.1-3.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icu-77.1-3.1.x86_64",
                "product": {
                  "name": "icu-77.1-3.1.x86_64",
                  "product_id": "icu-77.1-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-77.1-3.1.x86_64",
                "product": {
                  "name": "libicu-devel-77.1-3.1.x86_64",
                  "product_id": "libicu-devel-77.1-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-32bit-77.1-3.1.x86_64",
                "product": {
                  "name": "libicu-devel-32bit-77.1-3.1.x86_64",
                  "product_id": "libicu-devel-32bit-77.1-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libicu-doc-77.1-3.1.x86_64",
                "product": {
                  "name": "libicu-doc-77.1-3.1.x86_64",
                  "product_id": "libicu-doc-77.1-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libicu77-77.1-3.1.x86_64",
                "product": {
                  "name": "libicu77-77.1-3.1.x86_64",
                  "product_id": "libicu77-77.1-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libicu77-32bit-77.1-3.1.x86_64",
                "product": {
                  "name": "libicu77-32bit-77.1-3.1.x86_64",
                  "product_id": "libicu77-32bit-77.1-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libicu77-bedata-77.1-3.1.x86_64",
                "product": {
                  "name": "libicu77-bedata-77.1-3.1.x86_64",
                  "product_id": "libicu77-bedata-77.1-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libicu77-ledata-77.1-3.1.x86_64",
                "product": {
                  "name": "libicu77-ledata-77.1-3.1.x86_64",
                  "product_id": "libicu77-ledata-77.1-3.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-77.1-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:icu-77.1-3.1.aarch64"
        },
        "product_reference": "icu-77.1-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-77.1-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:icu-77.1-3.1.ppc64le"
        },
        "product_reference": "icu-77.1-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-77.1-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:icu-77.1-3.1.s390x"
        },
        "product_reference": "icu-77.1-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-77.1-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:icu-77.1-3.1.x86_64"
        },
        "product_reference": "icu-77.1-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-77.1-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu-devel-77.1-3.1.aarch64"
        },
        "product_reference": "libicu-devel-77.1-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-77.1-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu-devel-77.1-3.1.ppc64le"
        },
        "product_reference": "libicu-devel-77.1-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-77.1-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu-devel-77.1-3.1.s390x"
        },
        "product_reference": "libicu-devel-77.1-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-77.1-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu-devel-77.1-3.1.x86_64"
        },
        "product_reference": "libicu-devel-77.1-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-32bit-77.1-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu-devel-32bit-77.1-3.1.aarch64"
        },
        "product_reference": "libicu-devel-32bit-77.1-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-32bit-77.1-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu-devel-32bit-77.1-3.1.ppc64le"
        },
        "product_reference": "libicu-devel-32bit-77.1-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-32bit-77.1-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu-devel-32bit-77.1-3.1.s390x"
        },
        "product_reference": "libicu-devel-32bit-77.1-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-32bit-77.1-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu-devel-32bit-77.1-3.1.x86_64"
        },
        "product_reference": "libicu-devel-32bit-77.1-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-doc-77.1-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu-doc-77.1-3.1.aarch64"
        },
        "product_reference": "libicu-doc-77.1-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-doc-77.1-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu-doc-77.1-3.1.ppc64le"
        },
        "product_reference": "libicu-doc-77.1-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-doc-77.1-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu-doc-77.1-3.1.s390x"
        },
        "product_reference": "libicu-doc-77.1-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-doc-77.1-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu-doc-77.1-3.1.x86_64"
        },
        "product_reference": "libicu-doc-77.1-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu77-77.1-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu77-77.1-3.1.aarch64"
        },
        "product_reference": "libicu77-77.1-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu77-77.1-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu77-77.1-3.1.ppc64le"
        },
        "product_reference": "libicu77-77.1-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu77-77.1-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu77-77.1-3.1.s390x"
        },
        "product_reference": "libicu77-77.1-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu77-77.1-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu77-77.1-3.1.x86_64"
        },
        "product_reference": "libicu77-77.1-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu77-32bit-77.1-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu77-32bit-77.1-3.1.aarch64"
        },
        "product_reference": "libicu77-32bit-77.1-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu77-32bit-77.1-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu77-32bit-77.1-3.1.ppc64le"
        },
        "product_reference": "libicu77-32bit-77.1-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu77-32bit-77.1-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu77-32bit-77.1-3.1.s390x"
        },
        "product_reference": "libicu77-32bit-77.1-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu77-32bit-77.1-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu77-32bit-77.1-3.1.x86_64"
        },
        "product_reference": "libicu77-32bit-77.1-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu77-bedata-77.1-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu77-bedata-77.1-3.1.aarch64"
        },
        "product_reference": "libicu77-bedata-77.1-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu77-bedata-77.1-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu77-bedata-77.1-3.1.ppc64le"
        },
        "product_reference": "libicu77-bedata-77.1-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu77-bedata-77.1-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu77-bedata-77.1-3.1.s390x"
        },
        "product_reference": "libicu77-bedata-77.1-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu77-bedata-77.1-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu77-bedata-77.1-3.1.x86_64"
        },
        "product_reference": "libicu77-bedata-77.1-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu77-ledata-77.1-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu77-ledata-77.1-3.1.aarch64"
        },
        "product_reference": "libicu77-ledata-77.1-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu77-ledata-77.1-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu77-ledata-77.1-3.1.ppc64le"
        },
        "product_reference": "libicu77-ledata-77.1-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu77-ledata-77.1-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu77-ledata-77.1-3.1.s390x"
        },
        "product_reference": "libicu77-ledata-77.1-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu77-ledata-77.1-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libicu77-ledata-77.1-3.1.x86_64"
        },
        "product_reference": "libicu77-ledata-77.1-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-5222",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-5222"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the \u0027subtag\u0027 struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:icu-77.1-3.1.aarch64",
          "openSUSE Tumbleweed:icu-77.1-3.1.ppc64le",
          "openSUSE Tumbleweed:icu-77.1-3.1.s390x",
          "openSUSE Tumbleweed:icu-77.1-3.1.x86_64",
          "openSUSE Tumbleweed:libicu-devel-32bit-77.1-3.1.aarch64",
          "openSUSE Tumbleweed:libicu-devel-32bit-77.1-3.1.ppc64le",
          "openSUSE Tumbleweed:libicu-devel-32bit-77.1-3.1.s390x",
          "openSUSE Tumbleweed:libicu-devel-32bit-77.1-3.1.x86_64",
          "openSUSE Tumbleweed:libicu-devel-77.1-3.1.aarch64",
          "openSUSE Tumbleweed:libicu-devel-77.1-3.1.ppc64le",
          "openSUSE Tumbleweed:libicu-devel-77.1-3.1.s390x",
          "openSUSE Tumbleweed:libicu-devel-77.1-3.1.x86_64",
          "openSUSE Tumbleweed:libicu-doc-77.1-3.1.aarch64",
          "openSUSE Tumbleweed:libicu-doc-77.1-3.1.ppc64le",
          "openSUSE Tumbleweed:libicu-doc-77.1-3.1.s390x",
          "openSUSE Tumbleweed:libicu-doc-77.1-3.1.x86_64",
          "openSUSE Tumbleweed:libicu77-32bit-77.1-3.1.aarch64",
          "openSUSE Tumbleweed:libicu77-32bit-77.1-3.1.ppc64le",
          "openSUSE Tumbleweed:libicu77-32bit-77.1-3.1.s390x",
          "openSUSE Tumbleweed:libicu77-32bit-77.1-3.1.x86_64",
          "openSUSE Tumbleweed:libicu77-77.1-3.1.aarch64",
          "openSUSE Tumbleweed:libicu77-77.1-3.1.ppc64le",
          "openSUSE Tumbleweed:libicu77-77.1-3.1.s390x",
          "openSUSE Tumbleweed:libicu77-77.1-3.1.x86_64",
          "openSUSE Tumbleweed:libicu77-bedata-77.1-3.1.aarch64",
          "openSUSE Tumbleweed:libicu77-bedata-77.1-3.1.ppc64le",
          "openSUSE Tumbleweed:libicu77-bedata-77.1-3.1.s390x",
          "openSUSE Tumbleweed:libicu77-bedata-77.1-3.1.x86_64",
          "openSUSE Tumbleweed:libicu77-ledata-77.1-3.1.aarch64",
          "openSUSE Tumbleweed:libicu77-ledata-77.1-3.1.ppc64le",
          "openSUSE Tumbleweed:libicu77-ledata-77.1-3.1.s390x",
          "openSUSE Tumbleweed:libicu77-ledata-77.1-3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-5222",
          "url": "https://www.suse.com/security/cve/CVE-2025-5222"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1243721 for CVE-2025-5222",
          "url": "https://bugzilla.suse.com/1243721"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:icu-77.1-3.1.aarch64",
            "openSUSE Tumbleweed:icu-77.1-3.1.ppc64le",
            "openSUSE Tumbleweed:icu-77.1-3.1.s390x",
            "openSUSE Tumbleweed:icu-77.1-3.1.x86_64",
            "openSUSE Tumbleweed:libicu-devel-32bit-77.1-3.1.aarch64",
            "openSUSE Tumbleweed:libicu-devel-32bit-77.1-3.1.ppc64le",
            "openSUSE Tumbleweed:libicu-devel-32bit-77.1-3.1.s390x",
            "openSUSE Tumbleweed:libicu-devel-32bit-77.1-3.1.x86_64",
            "openSUSE Tumbleweed:libicu-devel-77.1-3.1.aarch64",
            "openSUSE Tumbleweed:libicu-devel-77.1-3.1.ppc64le",
            "openSUSE Tumbleweed:libicu-devel-77.1-3.1.s390x",
            "openSUSE Tumbleweed:libicu-devel-77.1-3.1.x86_64",
            "openSUSE Tumbleweed:libicu-doc-77.1-3.1.aarch64",
            "openSUSE Tumbleweed:libicu-doc-77.1-3.1.ppc64le",
            "openSUSE Tumbleweed:libicu-doc-77.1-3.1.s390x",
            "openSUSE Tumbleweed:libicu-doc-77.1-3.1.x86_64",
            "openSUSE Tumbleweed:libicu77-32bit-77.1-3.1.aarch64",
            "openSUSE Tumbleweed:libicu77-32bit-77.1-3.1.ppc64le",
            "openSUSE Tumbleweed:libicu77-32bit-77.1-3.1.s390x",
            "openSUSE Tumbleweed:libicu77-32bit-77.1-3.1.x86_64",
            "openSUSE Tumbleweed:libicu77-77.1-3.1.aarch64",
            "openSUSE Tumbleweed:libicu77-77.1-3.1.ppc64le",
            "openSUSE Tumbleweed:libicu77-77.1-3.1.s390x",
            "openSUSE Tumbleweed:libicu77-77.1-3.1.x86_64",
            "openSUSE Tumbleweed:libicu77-bedata-77.1-3.1.aarch64",
            "openSUSE Tumbleweed:libicu77-bedata-77.1-3.1.ppc64le",
            "openSUSE Tumbleweed:libicu77-bedata-77.1-3.1.s390x",
            "openSUSE Tumbleweed:libicu77-bedata-77.1-3.1.x86_64",
            "openSUSE Tumbleweed:libicu77-ledata-77.1-3.1.aarch64",
            "openSUSE Tumbleweed:libicu77-ledata-77.1-3.1.ppc64le",
            "openSUSE Tumbleweed:libicu77-ledata-77.1-3.1.s390x",
            "openSUSE Tumbleweed:libicu77-ledata-77.1-3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:icu-77.1-3.1.aarch64",
            "openSUSE Tumbleweed:icu-77.1-3.1.ppc64le",
            "openSUSE Tumbleweed:icu-77.1-3.1.s390x",
            "openSUSE Tumbleweed:icu-77.1-3.1.x86_64",
            "openSUSE Tumbleweed:libicu-devel-32bit-77.1-3.1.aarch64",
            "openSUSE Tumbleweed:libicu-devel-32bit-77.1-3.1.ppc64le",
            "openSUSE Tumbleweed:libicu-devel-32bit-77.1-3.1.s390x",
            "openSUSE Tumbleweed:libicu-devel-32bit-77.1-3.1.x86_64",
            "openSUSE Tumbleweed:libicu-devel-77.1-3.1.aarch64",
            "openSUSE Tumbleweed:libicu-devel-77.1-3.1.ppc64le",
            "openSUSE Tumbleweed:libicu-devel-77.1-3.1.s390x",
            "openSUSE Tumbleweed:libicu-devel-77.1-3.1.x86_64",
            "openSUSE Tumbleweed:libicu-doc-77.1-3.1.aarch64",
            "openSUSE Tumbleweed:libicu-doc-77.1-3.1.ppc64le",
            "openSUSE Tumbleweed:libicu-doc-77.1-3.1.s390x",
            "openSUSE Tumbleweed:libicu-doc-77.1-3.1.x86_64",
            "openSUSE Tumbleweed:libicu77-32bit-77.1-3.1.aarch64",
            "openSUSE Tumbleweed:libicu77-32bit-77.1-3.1.ppc64le",
            "openSUSE Tumbleweed:libicu77-32bit-77.1-3.1.s390x",
            "openSUSE Tumbleweed:libicu77-32bit-77.1-3.1.x86_64",
            "openSUSE Tumbleweed:libicu77-77.1-3.1.aarch64",
            "openSUSE Tumbleweed:libicu77-77.1-3.1.ppc64le",
            "openSUSE Tumbleweed:libicu77-77.1-3.1.s390x",
            "openSUSE Tumbleweed:libicu77-77.1-3.1.x86_64",
            "openSUSE Tumbleweed:libicu77-bedata-77.1-3.1.aarch64",
            "openSUSE Tumbleweed:libicu77-bedata-77.1-3.1.ppc64le",
            "openSUSE Tumbleweed:libicu77-bedata-77.1-3.1.s390x",
            "openSUSE Tumbleweed:libicu77-bedata-77.1-3.1.x86_64",
            "openSUSE Tumbleweed:libicu77-ledata-77.1-3.1.aarch64",
            "openSUSE Tumbleweed:libicu77-ledata-77.1-3.1.ppc64le",
            "openSUSE Tumbleweed:libicu77-ledata-77.1-3.1.s390x",
            "openSUSE Tumbleweed:libicu77-ledata-77.1-3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-03T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-5222"
    }
  ]
}
  CERTFR-2025-AVI-0935
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Gemfire | Tanzu GemFire versions antérieures à 10.2.0 | ||
| VMware | Tanzu | Tanzu pour Valkey versions 7.2.x antérieures à 7.2.11 | ||
| VMware | Tanzu Gemfire | Tanzu GemFire Management Console versions antérieures à 1.4.1 | ||
| VMware | Tanzu | Tanzu pour Valkey versions 3.x antérieures à 3.2.0 sur Kubernetes | ||
| VMware | Tanzu | Tanzu pour Valkey versions 8.1.x antérieures à 8.1.4 | ||
| VMware | Tanzu | Tanzu pour Valkey versions 8.0.x antérieures à 8.0.6 | 
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.2.0",
      "product": {
        "name": "Tanzu Gemfire",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu pour Valkey versions 7.2.x ant\u00e9rieures \u00e0 7.2.11",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu GemFire Management Console versions ant\u00e9rieures \u00e0 1.4.1",
      "product": {
        "name": "Tanzu Gemfire",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu pour Valkey versions 3.x ant\u00e9rieures \u00e0 3.2.0 sur Kubernetes",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu pour Valkey versions 8.1.x ant\u00e9rieures \u00e0 8.1.4",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu pour Valkey versions 8.0.x ant\u00e9rieures \u00e0 8.0.6",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-5222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
    },
    {
      "name": "CVE-2025-47907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
    },
    {
      "name": "CVE-2025-49844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49844"
    },
    {
      "name": "CVE-2025-5115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
    },
    {
      "name": "CVE-2025-46819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46819"
    },
    {
      "name": "CVE-2024-12798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
    },
    {
      "name": "CVE-2025-58057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
    },
    {
      "name": "CVE-2025-47906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
    },
    {
      "name": "CVE-2025-46817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46817"
    },
    {
      "name": "CVE-2025-4674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
    },
    {
      "name": "CVE-2025-7425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
    },
    {
      "name": "CVE-2024-6763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
    },
    {
      "name": "CVE-2022-29458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
    },
    {
      "name": "CVE-2025-55163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
    },
    {
      "name": "CVE-2025-8869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
    },
    {
      "name": "CVE-2025-58056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
    },
    {
      "name": "CVE-2025-27151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27151"
    },
    {
      "name": "CVE-2025-32415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
    },
    {
      "name": "CVE-2025-32414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
    },
    {
      "name": "CVE-2025-46818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46818"
    },
    {
      "name": "CVE-2025-53864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
    },
    {
      "name": "CVE-2025-54388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
    },
    {
      "name": "CVE-2025-8058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
    },
    {
      "name": "CVE-2025-5914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
    },
    {
      "name": "CVE-2025-22227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
    },
    {
      "name": "CVE-2025-47273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
    },
    {
      "name": "CVE-2016-1000027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    },
    {
      "name": "CVE-2025-11226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
    }
  ],
  "initial_release_date": "2025-10-29T00:00:00",
  "last_revision_date": "2025-10-29T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0935",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-10-29T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": "2025-10-28",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36259",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36259"
    },
    {
      "published_at": "2025-10-28",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36260",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36260"
    },
    {
      "published_at": "2025-10-28",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36261",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36261"
    },
    {
      "published_at": "2025-10-28",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36258",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36258"
    },
    {
      "published_at": "2025-10-28",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36262",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36262"
    },
    {
      "published_at": "2025-10-28",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36263",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36263"
    },
    {
      "published_at": "2025-10-28",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36264",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36264"
    }
  ]
}
  CERTFR-2025-AVI-0938
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu | Tanzu pour Postgres versions antérieures à 4.3.1 sur Kubernetes | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 6.31.0 | ||
| VMware | Tanzu | Tanzu pour Postgres versions antérieures à 13.22.0, 14.19.0, 15.14.0, 16.10.0 et 17.6.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 7.6.0 | 
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 4.3.1 sur Kubernetes",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.31.0",
      "product": {
        "name": "Tanzu Greenplum",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 13.22.0, 14.19.0, 15.14.0, 16.10.0 et 17.6.0",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 7.6.0",
      "product": {
        "name": "Tanzu Greenplum",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-6395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
    },
    {
      "name": "CVE-2023-52356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
    },
    {
      "name": "CVE-2025-8715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
    },
    {
      "name": "CVE-2022-39176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-39176"
    },
    {
      "name": "CVE-2025-9231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
    },
    {
      "name": "CVE-2023-4504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4504"
    },
    {
      "name": "CVE-2021-38593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38593"
    },
    {
      "name": "CVE-2025-5222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
    },
    {
      "name": "CVE-2020-26557",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
    },
    {
      "name": "CVE-2019-25059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-25059"
    },
    {
      "name": "CVE-2024-46951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46951"
    },
    {
      "name": "CVE-2025-31273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31273"
    },
    {
      "name": "CVE-2025-8941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
    },
    {
      "name": "CVE-2025-32913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32913"
    },
    {
      "name": "CVE-2021-31535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
    },
    {
      "name": "CVE-2023-37920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
    },
    {
      "name": "CVE-2022-39177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-39177"
    },
    {
      "name": "CVE-2025-0913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
    },
    {
      "name": "CVE-2025-47907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
    },
    {
      "name": "CVE-2025-2720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2720"
    },
    {
      "name": "CVE-2024-46956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46956"
    },
    {
      "name": "CVE-2025-58060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58060"
    },
    {
      "name": "CVE-2025-49794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
    },
    {
      "name": "CVE-2024-46953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46953"
    },
    {
      "name": "CVE-2025-24216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24216"
    },
    {
      "name": "CVE-2025-43212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43212"
    },
    {
      "name": "CVE-2025-8176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
    },
    {
      "name": "CVE-2025-24150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24150"
    },
    {
      "name": "CVE-2021-45078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
    },
    {
      "name": "CVE-2023-2222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2222"
    },
    {
      "name": "CVE-2024-8176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
    },
    {
      "name": "CVE-2025-2784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2784"
    },
    {
      "name": "CVE-2022-4055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4055"
    },
    {
      "name": "CVE-2025-50106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
    },
    {
      "name": "CVE-2022-44840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
    },
    {
      "name": "CVE-2024-44192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44192"
    },
    {
      "name": "CVE-2025-47910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
    },
    {
      "name": "CVE-2025-6965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
    },
    {
      "name": "CVE-2025-47906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
    },
    {
      "name": "CVE-2025-8194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
    },
    {
      "name": "CVE-2025-2723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2723"
    },
    {
      "name": "CVE-2025-31278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31278"
    },
    {
      "name": "CVE-2020-26559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
    },
    {
      "name": "CVE-2023-46751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46751"
    },
    {
      "name": "CVE-2025-4517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
    },
    {
      "name": "CVE-2025-2724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2724"
    },
    {
      "name": "CVE-2025-4674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
    },
    {
      "name": "CVE-2023-48161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
    },
    {
      "name": "CVE-2022-30294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30294"
    },
    {
      "name": "CVE-2025-6020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
    },
    {
      "name": "CVE-2025-7425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
    },
    {
      "name": "CVE-2025-43368",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43368"
    },
    {
      "name": "CVE-2023-52355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52355"
    },
    {
      "name": "CVE-2024-46954",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46954"
    },
    {
      "name": "CVE-2024-12718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
    },
    {
      "name": "CVE-2024-53920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
    },
    {
      "name": "CVE-2025-9232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
    },
    {
      "name": "CVE-2020-26556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
    },
    {
      "name": "CVE-2025-8713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
    },
    {
      "name": "CVE-2025-21587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
    },
    {
      "name": "CVE-2005-2541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
    },
    {
      "name": "CVE-2021-3826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
    },
    {
      "name": "CVE-2025-9900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
    },
    {
      "name": "CVE-2024-52533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
    },
    {
      "name": "CVE-2025-32914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32914"
    },
    {
      "name": "CVE-2021-32256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
    },
    {
      "name": "CVE-2025-43343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43343"
    },
    {
      "name": "CVE-2025-32990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
    },
    {
      "name": "CVE-2025-9288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
    },
    {
      "name": "CVE-2025-4802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
    },
    {
      "name": "CVE-2025-32989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
    },
    {
      "name": "CVE-2025-22874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
    },
    {
      "name": "CVE-2025-43272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43272"
    },
    {
      "name": "CVE-2025-50059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
    },
    {
      "name": "CVE-2025-6558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
    },
    {
      "name": "CVE-2025-8714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
    },
    {
      "name": "CVE-2025-32906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32906"
    },
    {
      "name": "CVE-2025-4673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
    },
    {
      "name": "CVE-2020-26560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
    },
    {
      "name": "CVE-2025-32988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
    },
    {
      "name": "CVE-2024-55549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
    },
    {
      "name": "CVE-2025-43216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43216"
    },
    {
      "name": "CVE-2023-2004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2004"
    },
    {
      "name": "CVE-2025-52194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52194"
    },
    {
      "name": "CVE-2025-6021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
    },
    {
      "name": "CVE-2023-24607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24607"
    },
    {
      "name": "CVE-2025-24209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24209"
    },
    {
      "name": "CVE-2024-0444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0444"
    },
    {
      "name": "CVE-2025-32415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
    },
    {
      "name": "CVE-2017-17973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-17973"
    },
    {
      "name": "CVE-2025-30749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
    },
    {
      "name": "CVE-2025-43342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43342"
    },
    {
      "name": "CVE-2025-9230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
    },
    {
      "name": "CVE-2025-32049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32049"
    },
    {
      "name": "CVE-2025-4948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4948"
    },
    {
      "name": "CVE-2025-49796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
    },
    {
      "name": "CVE-2024-4453",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4453"
    },
    {
      "name": "CVE-2025-31257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31257"
    },
    {
      "name": "CVE-2025-5914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
    },
    {
      "name": "CVE-2024-24786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
    },
    {
      "name": "CVE-2025-11021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-11021"
    },
    {
      "name": "CVE-2023-1579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1579"
    },
    {
      "name": "CVE-2024-46952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46952"
    },
    {
      "name": "CVE-2025-47273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
    },
    {
      "name": "CVE-2025-7345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7345"
    },
    {
      "name": "CVE-2025-30427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30427"
    },
    {
      "name": "CVE-2025-32911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32911"
    }
  ],
  "initial_release_date": "2025-10-30T00:00:00",
  "last_revision_date": "2025-10-30T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0938",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-10-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": "2025-10-29",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36277",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36277"
    },
    {
      "published_at": "2025-10-29",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36284",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36284"
    },
    {
      "published_at": "2025-10-29",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36281",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36281"
    },
    {
      "published_at": "2025-10-29",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36282",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36282"
    },
    {
      "published_at": "2025-10-29",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36283",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36283"
    }
  ]
}
  CERTFR-2025-AVI-0756
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 | 
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
      "product": {
        "name": "Tanzu Operations Manager",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2021-44832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
    },
    {
      "name": "CVE-2021-45105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
    },
    {
      "name": "CVE-2021-44228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
    },
    {
      "name": "CVE-2013-1548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
    },
    {
      "name": "CVE-2015-4779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
    },
    {
      "name": "CVE-2015-4780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
    },
    {
      "name": "CVE-2015-4787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
    },
    {
      "name": "CVE-2015-4790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
    },
    {
      "name": "CVE-2015-4778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
    },
    {
      "name": "CVE-2015-4782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
    },
    {
      "name": "CVE-2015-4789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
    },
    {
      "name": "CVE-2015-4764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
    },
    {
      "name": "CVE-2015-4783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
    },
    {
      "name": "CVE-2015-2583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
    },
    {
      "name": "CVE-2015-4781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
    },
    {
      "name": "CVE-2015-4776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
    },
    {
      "name": "CVE-2015-4786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
    },
    {
      "name": "CVE-2015-2656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
    },
    {
      "name": "CVE-2015-4788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
    },
    {
      "name": "CVE-2015-4785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
    },
    {
      "name": "CVE-2015-4754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
    },
    {
      "name": "CVE-2015-4775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
    },
    {
      "name": "CVE-2015-4777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
    },
    {
      "name": "CVE-2015-2640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
    },
    {
      "name": "CVE-2015-4774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
    },
    {
      "name": "CVE-2015-2626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
    },
    {
      "name": "CVE-2015-2624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
    },
    {
      "name": "CVE-2015-4784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
    },
    {
      "name": "CVE-2015-2654",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
    },
    {
      "name": "CVE-2017-8046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
    },
    {
      "name": "CVE-2018-3280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
    },
    {
      "name": "CVE-2018-3137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
    },
    {
      "name": "CVE-2018-3285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
    },
    {
      "name": "CVE-2018-3182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
    },
    {
      "name": "CVE-2018-3186",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
    },
    {
      "name": "CVE-2018-3195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
    },
    {
      "name": "CVE-2018-3286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
    },
    {
      "name": "CVE-2018-3170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
    },
    {
      "name": "CVE-2018-3279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
    },
    {
      "name": "CVE-2018-3212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
    },
    {
      "name": "CVE-2018-3203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
    },
    {
      "name": "CVE-2018-3145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
    },
    {
      "name": "CVE-2019-2530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
    },
    {
      "name": "CVE-2019-2436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
    },
    {
      "name": "CVE-2019-2539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
    },
    {
      "name": "CVE-2019-2494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
    },
    {
      "name": "CVE-2019-2535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
    },
    {
      "name": "CVE-2019-2533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
    },
    {
      "name": "CVE-2019-2495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
    },
    {
      "name": "CVE-2019-2513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
    },
    {
      "name": "CVE-2019-2536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
    },
    {
      "name": "CVE-2019-2502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
    },
    {
      "name": "CVE-2019-2634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
    },
    {
      "name": "CVE-2019-2587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
    },
    {
      "name": "CVE-2019-2584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
    },
    {
      "name": "CVE-2019-2691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
    },
    {
      "name": "CVE-2019-2606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
    },
    {
      "name": "CVE-2019-2630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
    },
    {
      "name": "CVE-2019-2624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
    },
    {
      "name": "CVE-2019-2623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
    },
    {
      "name": "CVE-2019-2695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
    },
    {
      "name": "CVE-2019-2596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
    },
    {
      "name": "CVE-2019-2580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
    },
    {
      "name": "CVE-2019-2644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
    },
    {
      "name": "CVE-2019-2681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
    },
    {
      "name": "CVE-2019-2617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
    },
    {
      "name": "CVE-2019-2636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
    },
    {
      "name": "CVE-2019-2689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
    },
    {
      "name": "CVE-2019-2693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
    },
    {
      "name": "CVE-2019-2593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
    },
    {
      "name": "CVE-2019-2625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
    },
    {
      "name": "CVE-2019-2585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
    },
    {
      "name": "CVE-2019-2631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
    },
    {
      "name": "CVE-2019-2694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
    },
    {
      "name": "CVE-2019-2620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
    },
    {
      "name": "CVE-2019-2688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
    },
    {
      "name": "CVE-2019-2589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
    },
    {
      "name": "CVE-2019-2635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
    },
    {
      "name": "CVE-2019-2626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
    },
    {
      "name": "CVE-2019-2686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
    },
    {
      "name": "CVE-2019-2685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
    },
    {
      "name": "CVE-2019-2687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
    },
    {
      "name": "CVE-2019-2607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
    },
    {
      "name": "CVE-2019-7317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
    },
    {
      "name": "CVE-2019-2811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
    },
    {
      "name": "CVE-2019-2740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
    },
    {
      "name": "CVE-2019-2879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
    },
    {
      "name": "CVE-2019-2808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
    },
    {
      "name": "CVE-2019-2738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
    },
    {
      "name": "CVE-2019-2819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
    },
    {
      "name": "CVE-2019-2737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
    },
    {
      "name": "CVE-2019-2814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
    },
    {
      "name": "CVE-2019-2778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
    },
    {
      "name": "CVE-2019-2822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
    },
    {
      "name": "CVE-2019-2802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
    },
    {
      "name": "CVE-2019-2803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
    },
    {
      "name": "CVE-2019-2752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
    },
    {
      "name": "CVE-2019-2826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
    },
    {
      "name": "CVE-2019-2784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
    },
    {
      "name": "CVE-2019-2789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
    },
    {
      "name": "CVE-2019-2801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
    },
    {
      "name": "CVE-2019-2791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
    },
    {
      "name": "CVE-2019-2798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
    },
    {
      "name": "CVE-2019-2796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
    },
    {
      "name": "CVE-2019-2815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
    },
    {
      "name": "CVE-2019-2810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
    },
    {
      "name": "CVE-2019-2780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
    },
    {
      "name": "CVE-2019-2758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
    },
    {
      "name": "CVE-2019-2757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
    },
    {
      "name": "CVE-2019-2785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
    },
    {
      "name": "CVE-2019-2747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
    },
    {
      "name": "CVE-2019-2741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
    },
    {
      "name": "CVE-2019-2830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
    },
    {
      "name": "CVE-2019-2834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
    },
    {
      "name": "CVE-2019-2743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
    },
    {
      "name": "CVE-2019-2739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
    },
    {
      "name": "CVE-2019-2805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
    },
    {
      "name": "CVE-2019-2797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
    },
    {
      "name": "CVE-2019-2774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
    },
    {
      "name": "CVE-2019-2795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
    },
    {
      "name": "CVE-2019-2746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
    },
    {
      "name": "CVE-2019-2812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
    },
    {
      "name": "CVE-2019-2924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
    },
    {
      "name": "CVE-2019-2914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
    },
    {
      "name": "CVE-2019-2960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
    },
    {
      "name": "CVE-2019-2923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
    },
    {
      "name": "CVE-2019-2968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
    },
    {
      "name": "CVE-2019-2993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
    },
    {
      "name": "CVE-2019-3009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
    },
    {
      "name": "CVE-2019-2969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
    },
    {
      "name": "CVE-2019-3011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
    },
    {
      "name": "CVE-2019-2967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
    },
    {
      "name": "CVE-2019-2946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
    },
    {
      "name": "CVE-2019-2966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
    },
    {
      "name": "CVE-2019-2957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
    },
    {
      "name": "CVE-2019-2948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
    },
    {
      "name": "CVE-2019-2922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
    },
    {
      "name": "CVE-2019-3004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
    },
    {
      "name": "CVE-2019-2998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
    },
    {
      "name": "CVE-2019-2911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
    },
    {
      "name": "CVE-2019-2950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
    },
    {
      "name": "CVE-2019-2910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
    },
    {
      "name": "CVE-2019-3018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
    },
    {
      "name": "CVE-2019-2974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
    },
    {
      "name": "CVE-2019-2991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
    },
    {
      "name": "CVE-2019-2997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
    },
    {
      "name": "CVE-2019-2938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
    },
    {
      "name": "CVE-2019-3003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
    },
    {
      "name": "CVE-2019-2982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
    },
    {
      "name": "CVE-2019-2963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
    },
    {
      "name": "CVE-2020-2579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
    },
    {
      "name": "CVE-2020-2584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
    },
    {
      "name": "CVE-2020-2577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
    },
    {
      "name": "CVE-2020-2679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
    },
    {
      "name": "CVE-2020-2570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
    },
    {
      "name": "CVE-2020-2572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
    },
    {
      "name": "CVE-2020-2627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
    },
    {
      "name": "CVE-2020-2660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
    },
    {
      "name": "CVE-2020-2589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
    },
    {
      "name": "CVE-2020-2573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
    },
    {
      "name": "CVE-2020-2686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
    },
    {
      "name": "CVE-2020-2694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
    },
    {
      "name": "CVE-2020-2574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
    },
    {
      "name": "CVE-2020-2770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
    },
    {
      "name": "CVE-2020-2925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
    },
    {
      "name": "CVE-2020-2853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
    },
    {
      "name": "CVE-2020-2774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
    },
    {
      "name": "CVE-2020-2928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
    },
    {
      "name": "CVE-2020-2897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
    },
    {
      "name": "CVE-2020-2812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
    },
    {
      "name": "CVE-2020-2765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
    },
    {
      "name": "CVE-2020-2761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
    },
    {
      "name": "CVE-2020-2790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
    },
    {
      "name": "CVE-2020-2752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
    },
    {
      "name": "CVE-2020-2904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
    },
    {
      "name": "CVE-2020-2893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
    },
    {
      "name": "CVE-2020-2760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
    },
    {
      "name": "CVE-2020-2780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
    },
    {
      "name": "CVE-2020-2903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
    },
    {
      "name": "CVE-2020-2924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
    },
    {
      "name": "CVE-2020-2806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
    },
    {
      "name": "CVE-2020-2922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
    },
    {
      "name": "CVE-2020-2901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
    },
    {
      "name": "CVE-2020-2926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
    },
    {
      "name": "CVE-2020-2923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
    },
    {
      "name": "CVE-2020-2921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
    },
    {
      "name": "CVE-2020-2779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
    },
    {
      "name": "CVE-2020-2892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
    },
    {
      "name": "CVE-2020-2896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
    },
    {
      "name": "CVE-2020-2804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
    },
    {
      "name": "CVE-2020-2895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
    },
    {
      "name": "CVE-2020-2930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
    },
    {
      "name": "CVE-2020-2814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
    },
    {
      "name": "CVE-2020-2759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
    },
    {
      "name": "CVE-2020-2763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
    },
    {
      "name": "CVE-2020-14550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
    },
    {
      "name": "CVE-2020-14567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
    },
    {
      "name": "CVE-2020-14559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
    },
    {
      "name": "CVE-2020-14576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
    },
    {
      "name": "CVE-2020-14540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
    },
    {
      "name": "CVE-2020-14547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
    },
    {
      "name": "CVE-2020-14553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
    },
    {
      "name": "CVE-2020-14539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
    },
    {
      "name": "CVE-2020-14845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
    },
    {
      "name": "CVE-2020-14799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
    },
    {
      "name": "CVE-2020-14793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
    },
    {
      "name": "CVE-2020-14888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
    },
    {
      "name": "CVE-2020-14790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
    },
    {
      "name": "CVE-2020-14789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
    },
    {
      "name": "CVE-2020-14672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
    },
    {
      "name": "CVE-2020-14846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
    },
    {
      "name": "CVE-2020-14771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
    },
    {
      "name": "CVE-2020-14873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
    },
    {
      "name": "CVE-2020-14791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
    },
    {
      "name": "CVE-2020-14769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
    },
    {
      "name": "CVE-2020-14844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
    },
    {
      "name": "CVE-2020-14809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
    },
    {
      "name": "CVE-2020-14860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
    },
    {
      "name": "CVE-2020-14866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
    },
    {
      "name": "CVE-2020-14861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
    },
    {
      "name": "CVE-2020-14773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
    },
    {
      "name": "CVE-2020-14776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
    },
    {
      "name": "CVE-2020-14852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
    },
    {
      "name": "CVE-2020-14760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
    },
    {
      "name": "CVE-2020-14870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
    },
    {
      "name": "CVE-2020-14837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
    },
    {
      "name": "CVE-2020-14893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
    },
    {
      "name": "CVE-2020-14836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
    },
    {
      "name": "CVE-2020-14829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
    },
    {
      "name": "CVE-2020-14868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
    },
    {
      "name": "CVE-2020-14827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
    },
    {
      "name": "CVE-2020-14839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
    },
    {
      "name": "CVE-2020-14777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
    },
    {
      "name": "CVE-2020-14812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
    },
    {
      "name": "CVE-2020-14775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
    },
    {
      "name": "CVE-2020-14838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
    },
    {
      "name": "CVE-2020-14869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
    },
    {
      "name": "CVE-2020-14765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
    },
    {
      "name": "CVE-2020-14814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
    },
    {
      "name": "CVE-2020-14821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
    },
    {
      "name": "CVE-2020-14830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
    },
    {
      "name": "CVE-2020-14828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
    },
    {
      "name": "CVE-2020-14804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
    },
    {
      "name": "CVE-2020-14800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
    },
    {
      "name": "CVE-2020-14891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
    },
    {
      "name": "CVE-2020-14848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
    },
    {
      "name": "CVE-2020-14867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
    },
    {
      "name": "CVE-2020-14785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
    },
    {
      "name": "CVE-2020-14794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
    },
    {
      "name": "CVE-2020-14786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
    },
    {
      "name": "CVE-2020-15358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
    },
    {
      "name": "CVE-2020-1971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
    },
    {
      "name": "CVE-2021-2010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
    },
    {
      "name": "CVE-2021-2001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
    },
    {
      "name": "CVE-2021-2060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
    },
    {
      "name": "CVE-2021-2014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
    },
    {
      "name": "CVE-2021-2032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
    },
    {
      "name": "CVE-2021-2036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
    },
    {
      "name": "CVE-2021-2007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
    },
    {
      "name": "CVE-2021-2011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
    },
    {
      "name": "CVE-2021-2022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
    },
    {
      "name": "CVE-2019-25013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
    },
    {
      "name": "CVE-2021-2308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
    },
    {
      "name": "CVE-2021-2213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
    },
    {
      "name": "CVE-2021-2172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
    },
    {
      "name": "CVE-2021-2293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
    },
    {
      "name": "CVE-2021-2208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
    },
    {
      "name": "CVE-2021-2196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
    },
    {
      "name": "CVE-2021-2194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
    },
    {
      "name": "CVE-2021-2298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
    },
    {
      "name": "CVE-2021-2162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
    },
    {
      "name": "CVE-2021-2179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
    },
    {
      "name": "CVE-2021-2307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
    },
    {
      "name": "CVE-2021-2217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
    },
    {
      "name": "CVE-2021-2180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
    },
    {
      "name": "CVE-2021-2203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
    },
    {
      "name": "CVE-2021-2144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
    },
    {
      "name": "CVE-2021-2226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
    },
    {
      "name": "CVE-2021-2232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
    },
    {
      "name": "CVE-2021-2169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
    },
    {
      "name": "CVE-2021-2301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
    },
    {
      "name": "CVE-2021-2202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
    },
    {
      "name": "CVE-2021-2166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
    },
    {
      "name": "CVE-2021-2174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
    },
    {
      "name": "CVE-2021-2154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
    },
    {
      "name": "CVE-2021-2193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
    },
    {
      "name": "CVE-2021-2300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
    },
    {
      "name": "CVE-2021-2299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
    },
    {
      "name": "CVE-2021-2212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
    },
    {
      "name": "CVE-2021-2178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
    },
    {
      "name": "CVE-2021-2146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
    },
    {
      "name": "CVE-2021-2230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
    },
    {
      "name": "CVE-2021-2278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
    },
    {
      "name": "CVE-2021-2164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
    },
    {
      "name": "CVE-2021-2201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
    },
    {
      "name": "CVE-2021-2170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
    },
    {
      "name": "CVE-2021-2304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
    },
    {
      "name": "CVE-2021-2160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
    },
    {
      "name": "CVE-2021-2171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
    },
    {
      "name": "CVE-2021-2305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
    },
    {
      "name": "CVE-2021-2215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
    },
    {
      "name": "CVE-2021-25214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
    },
    {
      "name": "CVE-2012-6153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
    },
    {
      "name": "CVE-2020-10878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
    },
    {
      "name": "CVE-2021-2370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
    },
    {
      "name": "CVE-2021-2389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
    },
    {
      "name": "CVE-2021-2444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
    },
    {
      "name": "CVE-2021-2429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
    },
    {
      "name": "CVE-2021-2426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
    },
    {
      "name": "CVE-2021-2427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
    },
    {
      "name": "CVE-2021-2339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
    },
    {
      "name": "CVE-2021-2425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
    },
    {
      "name": "CVE-2021-2387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
    },
    {
      "name": "CVE-2021-2383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
    },
    {
      "name": "CVE-2021-2372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
    },
    {
      "name": "CVE-2021-2399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
    },
    {
      "name": "CVE-2021-2384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
    },
    {
      "name": "CVE-2021-2412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
    },
    {
      "name": "CVE-2021-2441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
    },
    {
      "name": "CVE-2021-2410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
    },
    {
      "name": "CVE-2021-2342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
    },
    {
      "name": "CVE-2021-2437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
    },
    {
      "name": "CVE-2021-2417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
    },
    {
      "name": "CVE-2021-2424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
    },
    {
      "name": "CVE-2021-2385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
    },
    {
      "name": "CVE-2021-2357",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
    },
    {
      "name": "CVE-2021-2352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
    },
    {
      "name": "CVE-2021-2402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
    },
    {
      "name": "CVE-2021-2440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
    },
    {
      "name": "CVE-2021-2340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
    },
    {
      "name": "CVE-2021-2390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
    },
    {
      "name": "CVE-2021-2374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
    },
    {
      "name": "CVE-2021-2356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
    },
    {
      "name": "CVE-2021-2411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
    },
    {
      "name": "CVE-2021-2418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
    },
    {
      "name": "CVE-2021-2367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
    },
    {
      "name": "CVE-2021-2354",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
    },
    {
      "name": "CVE-2021-2422",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
    },
    {
      "name": "CVE-2020-10543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
    },
    {
      "name": "CVE-2020-12723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
    },
    {
      "name": "CVE-2020-10029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
    },
    {
      "name": "CVE-2021-23337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
    },
    {
      "name": "CVE-2020-28500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
    },
    {
      "name": "CVE-2019-18276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
    },
    {
      "name": "CVE-2021-3421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
    },
    {
      "name": "CVE-2021-3326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
    },
    {
      "name": "CVE-2019-2708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
    },
    {
      "name": "CVE-2020-27618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
    },
    {
      "name": "CVE-2021-35640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
    },
    {
      "name": "CVE-2021-35626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
    },
    {
      "name": "CVE-2021-2478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
    },
    {
      "name": "CVE-2021-35624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
    },
    {
      "name": "CVE-2021-35583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
    },
    {
      "name": "CVE-2021-35628",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
    },
    {
      "name": "CVE-2021-35630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
    },
    {
      "name": "CVE-2021-35644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
    },
    {
      "name": "CVE-2021-2479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
    },
    {
      "name": "CVE-2021-35638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
    },
    {
      "name": "CVE-2021-35646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
    },
    {
      "name": "CVE-2021-35596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
    },
    {
      "name": "CVE-2021-35643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
    },
    {
      "name": "CVE-2021-35637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
    },
    {
      "name": "CVE-2021-35623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
    },
    {
      "name": "CVE-2021-35632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
    },
    {
      "name": "CVE-2021-35641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
    },
    {
      "name": "CVE-2021-35604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
    },
    {
      "name": "CVE-2021-35636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
    },
    {
      "name": "CVE-2021-35546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
    },
    {
      "name": "CVE-2021-35627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
    },
    {
      "name": "CVE-2021-35625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
    },
    {
      "name": "CVE-2021-35608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
    },
    {
      "name": "CVE-2021-35597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
    },
    {
      "name": "CVE-2021-35537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
    },
    {
      "name": "CVE-2021-2481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
    },
    {
      "name": "CVE-2021-35622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
    },
    {
      "name": "CVE-2021-35610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
    },
    {
      "name": "CVE-2021-35633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
    },
    {
      "name": "CVE-2021-35634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
    },
    {
      "name": "CVE-2021-35629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
    },
    {
      "name": "CVE-2021-35631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
    },
    {
      "name": "CVE-2021-35645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
    },
    {
      "name": "CVE-2021-35647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
    },
    {
      "name": "CVE-2021-35612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
    },
    {
      "name": "CVE-2021-35639",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
    },
    {
      "name": "CVE-2021-35648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
    },
    {
      "name": "CVE-2021-35607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
    },
    {
      "name": "CVE-2021-35602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
    },
    {
      "name": "CVE-2021-35577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
    },
    {
      "name": "CVE-2021-35642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
    },
    {
      "name": "CVE-2021-35575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
    },
    {
      "name": "CVE-2021-35635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
    },
    {
      "name": "CVE-2021-35591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
    },
    {
      "name": "CVE-2021-25219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
    },
    {
      "name": "CVE-2021-3875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
    },
    {
      "name": "CVE-2019-10744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
    },
    {
      "name": "CVE-2022-21352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
    },
    {
      "name": "CVE-2022-21304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
    },
    {
      "name": "CVE-2022-21254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
    },
    {
      "name": "CVE-2022-21265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
    },
    {
      "name": "CVE-2022-21348",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
    },
    {
      "name": "CVE-2022-21372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
    },
    {
      "name": "CVE-2022-21245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
    },
    {
      "name": "CVE-2022-21368",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
    },
    {
      "name": "CVE-2022-21339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
    },
    {
      "name": "CVE-2022-21264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
    },
    {
      "name": "CVE-2022-21297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
    },
    {
      "name": "CVE-2022-21379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
    },
    {
      "name": "CVE-2022-21253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
    },
    {
      "name": "CVE-2022-21301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
    },
    {
      "name": "CVE-2022-21378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
    },
    {
      "name": "CVE-2022-21370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
    },
    {
      "name": "CVE-2022-21302",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
    },
    {
      "name": "CVE-2022-21249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
    },
    {
      "name": "CVE-2022-21344",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
    },
    {
      "name": "CVE-2022-21270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
    },
    {
      "name": "CVE-2022-21367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
    },
    {
      "name": "CVE-2022-21342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
    },
    {
      "name": "CVE-2022-21362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
    },
    {
      "name": "CVE-2022-21303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
    },
    {
      "name": "CVE-2022-21256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
    },
    {
      "name": "CVE-2022-21358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
    },
    {
      "name": "CVE-2022-21374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
    },
    {
      "name": "CVE-2022-3602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
    },
    {
      "name": "CVE-2022-2309",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
    },
    {
      "name": "CVE-2022-29824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
    },
    {
      "name": "CVE-2022-35737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
    },
    {
      "name": "CVE-2022-40303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
    },
    {
      "name": "CVE-2022-40304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
    },
    {
      "name": "CVE-2020-8203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
    },
    {
      "name": "CVE-2022-3786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
    },
    {
      "name": "CVE-2022-2795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
    },
    {
      "name": "CVE-2022-34903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
    },
    {
      "name": "CVE-2022-3515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
    },
    {
      "name": "CVE-2022-3996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
    },
    {
      "name": "CVE-2022-22942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
    },
    {
      "name": "CVE-2021-4193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
    },
    {
      "name": "CVE-2020-15366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
    },
    {
      "name": "CVE-2022-22965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
    },
    {
      "name": "CVE-2022-0213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
    },
    {
      "name": "CVE-2022-21418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
    },
    {
      "name": "CVE-2022-21412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
    },
    {
      "name": "CVE-2022-21437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
    },
    {
      "name": "CVE-2022-21478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
    },
    {
      "name": "CVE-2022-21479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
    },
    {
      "name": "CVE-2022-21438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
    },
    {
      "name": "CVE-2022-21440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
    },
    {
      "name": "CVE-2022-21451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
    },
    {
      "name": "CVE-2022-21427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
    },
    {
      "name": "CVE-2022-21415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
    },
    {
      "name": "CVE-2022-21459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
    },
    {
      "name": "CVE-2022-21460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
    },
    {
      "name": "CVE-2022-21414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
    },
    {
      "name": "CVE-2022-21413",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
    },
    {
      "name": "CVE-2022-21436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
    },
    {
      "name": "CVE-2022-21435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
    },
    {
      "name": "CVE-2022-21462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
    },
    {
      "name": "CVE-2022-21444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
    },
    {
      "name": "CVE-2022-21417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
    },
    {
      "name": "CVE-2022-21457",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
    },
    {
      "name": "CVE-2022-21425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
    },
    {
      "name": "CVE-2022-21452",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
    },
    {
      "name": "CVE-2021-20266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
    },
    {
      "name": "CVE-2022-1292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
    },
    {
      "name": "CVE-2022-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
    },
    {
      "name": "CVE-2021-3521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
    },
    {
      "name": "CVE-2021-4122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
    },
    {
      "name": "CVE-2022-2068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
    },
    {
      "name": "CVE-2017-7500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
    },
    {
      "name": "CVE-2021-33574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
    },
    {
      "name": "CVE-2017-11164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
    },
    {
      "name": "CVE-2022-21525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
    },
    {
      "name": "CVE-2022-21537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
    },
    {
      "name": "CVE-2022-21455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
    },
    {
      "name": "CVE-2022-21534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
    },
    {
      "name": "CVE-2022-21528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
    },
    {
      "name": "CVE-2022-21529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
    },
    {
      "name": "CVE-2022-21531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
    },
    {
      "name": "CVE-2022-21515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
    },
    {
      "name": "CVE-2022-21538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
    },
    {
      "name": "CVE-2022-21527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
    },
    {
      "name": "CVE-2022-21517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
    },
    {
      "name": "CVE-2022-21539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
    },
    {
      "name": "CVE-2022-21556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
    },
    {
      "name": "CVE-2022-21509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
    },
    {
      "name": "CVE-2022-21553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
    },
    {
      "name": "CVE-2022-21530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
    },
    {
      "name": "CVE-2022-21522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
    },
    {
      "name": "CVE-2022-21547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
    },
    {
      "name": "CVE-2022-21569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
    },
    {
      "name": "CVE-2022-21526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
    },
    {
      "name": "CVE-2021-3999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
    },
    {
      "name": "CVE-2022-23218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
    },
    {
      "name": "CVE-2022-23219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
    },
    {
      "name": "CVE-2022-27782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
    },
    {
      "name": "CVE-2021-25220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
    },
    {
      "name": "CVE-2022-0396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
    },
    {
      "name": "CVE-2022-3358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
    },
    {
      "name": "CVE-2022-1271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
    },
    {
      "name": "CVE-2012-5783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
    },
    {
      "name": "CVE-2022-21592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
    },
    {
      "name": "CVE-2022-21617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
    },
    {
      "name": "CVE-2022-21595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
    },
    {
      "name": "CVE-2022-21608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
    },
    {
      "name": "CVE-2022-21589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
    },
    {
      "name": "CVE-2023-21863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
    },
    {
      "name": "CVE-2023-21873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
    },
    {
      "name": "CVE-2023-21879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
    },
    {
      "name": "CVE-2023-21880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
    },
    {
      "name": "CVE-2023-21869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
    },
    {
      "name": "CVE-2023-21872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
    },
    {
      "name": "CVE-2023-21877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
    },
    {
      "name": "CVE-2023-21870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
    },
    {
      "name": "CVE-2023-21887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
    },
    {
      "name": "CVE-2023-21836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
    },
    {
      "name": "CVE-2023-21881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
    },
    {
      "name": "CVE-2023-21876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
    },
    {
      "name": "CVE-2023-21840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
    },
    {
      "name": "CVE-2023-21878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
    },
    {
      "name": "CVE-2023-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
    },
    {
      "name": "CVE-2023-21875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
    },
    {
      "name": "CVE-2023-21865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
    },
    {
      "name": "CVE-2023-21883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
    },
    {
      "name": "CVE-2023-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
    },
    {
      "name": "CVE-2023-21874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
    },
    {
      "name": "CVE-2023-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2023-0401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
    },
    {
      "name": "CVE-2023-0215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
    },
    {
      "name": "CVE-2023-0217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
    },
    {
      "name": "CVE-2023-0216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
    },
    {
      "name": "CVE-2022-4450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
    },
    {
      "name": "CVE-2022-4415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
    },
    {
      "name": "CVE-2023-24329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
    },
    {
      "name": "CVE-2023-0464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
    },
    {
      "name": "CVE-2023-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
    },
    {
      "name": "CVE-2023-21977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
    },
    {
      "name": "CVE-2023-21912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
    },
    {
      "name": "CVE-2023-29469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
    },
    {
      "name": "CVE-2023-28484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
    },
    {
      "name": "CVE-2023-20873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
    },
    {
      "name": "CVE-2023-20883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
    },
    {
      "name": "CVE-2023-27535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
    },
    {
      "name": "CVE-2023-27538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
    },
    {
      "name": "CVE-2023-27536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
    },
    {
      "name": "CVE-2023-27537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
    },
    {
      "name": "CVE-2020-1752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
    },
    {
      "name": "CVE-2021-35942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
    },
    {
      "name": "CVE-2021-38604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
    },
    {
      "name": "CVE-2020-29562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
    },
    {
      "name": "CVE-2021-27645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
    },
    {
      "name": "CVE-2023-28322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
    },
    {
      "name": "CVE-2022-46908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
    },
    {
      "name": "CVE-2023-28320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
    },
    {
      "name": "CVE-2023-28321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
    },
    {
      "name": "CVE-2023-22053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
    },
    {
      "name": "CVE-2023-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
    },
    {
      "name": "CVE-2022-4899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
    },
    {
      "name": "CVE-2022-25883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
    },
    {
      "name": "CVE-2023-40403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
    },
    {
      "name": "CVE-2023-4911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2016-1000027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
    },
    {
      "name": "CVE-2023-35116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
    },
    {
      "name": "CVE-2023-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
    },
    {
      "name": "CVE-2023-22084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
    },
    {
      "name": "CVE-2023-22026",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
    },
    {
      "name": "CVE-2023-22028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
    },
    {
      "name": "CVE-2023-22015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
    },
    {
      "name": "CVE-2023-22103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
    },
    {
      "name": "CVE-2023-22068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
    },
    {
      "name": "CVE-2023-22078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
    },
    {
      "name": "CVE-2023-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
    },
    {
      "name": "CVE-2023-22059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
    },
    {
      "name": "CVE-2023-22066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
    },
    {
      "name": "CVE-2023-22114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
    },
    {
      "name": "CVE-2023-22070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
    },
    {
      "name": "CVE-2023-22032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
    },
    {
      "name": "CVE-2023-5363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
    },
    {
      "name": "CVE-2023-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
    },
    {
      "name": "CVE-2023-45853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    },
    {
      "name": "CVE-2023-40217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
    },
    {
      "name": "CVE-2023-45803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
    },
    {
      "name": "CVE-2021-22570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
    },
    {
      "name": "CVE-2023-2603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
    },
    {
      "name": "CVE-2023-2602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
    },
    {
      "name": "CVE-2023-4527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
    },
    {
      "name": "CVE-2023-4813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
    },
    {
      "name": "CVE-2023-4806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
    },
    {
      "name": "CVE-2022-48303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
    },
    {
      "name": "CVE-2023-34055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
    },
    {
      "name": "CVE-2023-4039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
    },
    {
      "name": "CVE-2022-3715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
    },
    {
      "name": "CVE-2023-0687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
    },
    {
      "name": "CVE-2023-5156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
    },
    {
      "name": "CVE-2022-48522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
    },
    {
      "name": "CVE-2023-39615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
    },
    {
      "name": "CVE-2021-46848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
    },
    {
      "name": "CVE-2021-33294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
    },
    {
      "name": "CVE-2021-43618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
    },
    {
      "name": "CVE-2023-45322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
    },
    {
      "name": "CVE-2022-28321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
    },
    {
      "name": "CVE-2023-4016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
    },
    {
      "name": "CVE-2013-4235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
    },
    {
      "name": "CVE-2023-34969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
    },
    {
      "name": "CVE-2021-20193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
    },
    {
      "name": "CVE-2023-29383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
    },
    {
      "name": "CVE-2023-5981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
    },
    {
      "name": "CVE-2023-48795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
    },
    {
      "name": "CVE-2023-6237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
    },
    {
      "name": "CVE-2023-31484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
    },
    {
      "name": "CVE-2023-36054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
    },
    {
      "name": "CVE-2023-7104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
    },
    {
      "name": "CVE-2023-6129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
    },
    {
      "name": "CVE-2023-46218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
    },
    {
      "name": "CVE-2023-46219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
    },
    {
      "name": "CVE-2024-0727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
    },
    {
      "name": "CVE-2023-47100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
    },
    {
      "name": "CVE-2023-47038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
    },
    {
      "name": "CVE-2023-39325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
    },
    {
      "name": "CVE-2022-27772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
    },
    {
      "name": "CVE-2023-27043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
    },
    {
      "name": "CVE-2023-6481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
    },
    {
      "name": "CVE-2023-36632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
    },
    {
      "name": "CVE-2024-28085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
    },
    {
      "name": "CVE-2024-2511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
    },
    {
      "name": "CVE-2020-22916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
    },
    {
      "name": "CVE-2016-2781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
    },
    {
      "name": "CVE-2023-3978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
    },
    {
      "name": "CVE-2017-7501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
    },
    {
      "name": "CVE-2021-35939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
    },
    {
      "name": "CVE-2024-0553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
    },
    {
      "name": "CVE-2021-35938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
    },
    {
      "name": "CVE-2021-35937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
    },
    {
      "name": "CVE-2023-6597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
    },
    {
      "name": "CVE-2024-26686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
    },
    {
      "name": "CVE-2023-52572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
    },
    {
      "name": "CVE-2007-4559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
    },
    {
      "name": "CVE-2023-3138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
    },
    {
      "name": "CVE-2024-28182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
    },
    {
      "name": "CVE-2023-45288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
    },
    {
      "name": "CVE-2024-4603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
    },
    {
      "name": "CVE-2023-6378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
    },
    {
      "name": "CVE-2023-31486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
    },
    {
      "name": "CVE-2024-26739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
    },
    {
      "name": "CVE-2024-4741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
    },
    {
      "name": "CVE-2023-51074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
    },
    {
      "name": "CVE-2023-52757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
    },
    {
      "name": "CVE-2024-35866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
    },
    {
      "name": "CVE-2024-35867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
    },
    {
      "name": "CVE-2024-35943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
    },
    {
      "name": "CVE-2024-28180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2024-30171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
    },
    {
      "name": "CVE-2024-30172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
    },
    {
      "name": "CVE-2024-5535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
    },
    {
      "name": "CVE-2024-35790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2024-2004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-0397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
    },
    {
      "name": "CVE-2024-4030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
    },
    {
      "name": "CVE-2024-4032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
    },
    {
      "name": "CVE-2024-3596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
    },
    {
      "name": "CVE-2024-0450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
    },
    {
      "name": "CVE-2024-25062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
    },
    {
      "name": "CVE-2024-26458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
    },
    {
      "name": "CVE-2024-26461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
    },
    {
      "name": "CVE-2024-28834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
    },
    {
      "name": "CVE-2024-2961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
    },
    {
      "name": "CVE-2024-33599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
    },
    {
      "name": "CVE-2024-33600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
    },
    {
      "name": "CVE-2024-33601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
    },
    {
      "name": "CVE-2024-33602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
    },
    {
      "name": "CVE-2024-35195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
    },
    {
      "name": "CVE-2024-36945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
    },
    {
      "name": "CVE-2024-38540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
    },
    {
      "name": "CVE-2024-38541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
    },
    {
      "name": "CVE-2023-4641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
    },
    {
      "name": "CVE-2024-0567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
    },
    {
      "name": "CVE-2024-22365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
    },
    {
      "name": "CVE-2024-21137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
    },
    {
      "name": "CVE-2024-0760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
    },
    {
      "name": "CVE-2024-1737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
    },
    {
      "name": "CVE-2024-1975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
    },
    {
      "name": "CVE-2024-28835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
    },
    {
      "name": "CVE-2024-6923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
    },
    {
      "name": "CVE-2024-3219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
    },
    {
      "name": "CVE-2024-36908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
    },
    {
      "name": "CVE-2024-27402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
    },
    {
      "name": "CVE-2024-37891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    },
    {
      "name": "CVE-2024-38808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
    },
    {
      "name": "CVE-2024-38809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
    },
    {
      "name": "CVE-2024-42230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
    },
    {
      "name": "CVE-2024-38807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
    },
    {
      "name": "CVE-2024-6232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
    },
    {
      "name": "CVE-2024-6119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
    },
    {
      "name": "CVE-2024-38816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
    },
    {
      "name": "CVE-2022-48893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
    },
    {
      "name": "CVE-2024-42322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
    },
    {
      "name": "CVE-2024-7264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
    },
    {
      "name": "CVE-2023-5841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
    },
    {
      "name": "CVE-2024-34459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
    },
    {
      "name": "CVE-2024-8096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
    },
    {
      "name": "CVE-2023-6246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
    },
    {
      "name": "CVE-2024-46812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
    },
    {
      "name": "CVE-2024-46821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
    },
    {
      "name": "CVE-2024-46751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
    },
    {
      "name": "CVE-2024-46753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
    },
    {
      "name": "CVE-2024-46774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
    },
    {
      "name": "CVE-2024-46787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
    },
    {
      "name": "CVE-2022-21454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
    },
    {
      "name": "CVE-2024-21193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
    },
    {
      "name": "CVE-2024-21194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
    },
    {
      "name": "CVE-2024-21196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
    },
    {
      "name": "CVE-2024-21197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
    },
    {
      "name": "CVE-2024-21198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
    },
    {
      "name": "CVE-2024-21199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
    },
    {
      "name": "CVE-2024-21201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
    },
    {
      "name": "CVE-2024-21207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
    },
    {
      "name": "CVE-2024-21209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
    },
    {
      "name": "CVE-2024-21212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
    },
    {
      "name": "CVE-2024-21213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
    },
    {
      "name": "CVE-2024-21219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
    },
    {
      "name": "CVE-2024-21236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
    },
    {
      "name": "CVE-2024-21239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
    },
    {
      "name": "CVE-2024-21241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
    },
    {
      "name": "CVE-2024-7254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
    },
    {
      "name": "CVE-2024-9143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
    },
    {
      "name": "CVE-2024-38819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
    },
    {
      "name": "CVE-2024-38820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
    },
    {
      "name": "CVE-2024-10487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
    },
    {
      "name": "CVE-2024-10458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
    },
    {
      "name": "CVE-2024-10459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
    },
    {
      "name": "CVE-2024-10460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
    },
    {
      "name": "CVE-2024-10461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
    },
    {
      "name": "CVE-2024-10462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
    },
    {
      "name": "CVE-2024-10463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
    },
    {
      "name": "CVE-2024-10464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
    },
    {
      "name": "CVE-2024-10465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
    },
    {
      "name": "CVE-2024-10466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
    },
    {
      "name": "CVE-2024-10467",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
    },
    {
      "name": "CVE-2024-10468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
    },
    {
      "name": "CVE-2024-34447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
    },
    {
      "name": "CVE-2024-38286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
    },
    {
      "name": "CVE-2024-7592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
    },
    {
      "name": "CVE-2024-8088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
    },
    {
      "name": "CVE-2024-9681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
    },
    {
      "name": "CVE-2024-11168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
    },
    {
      "name": "CVE-2024-38828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
    },
    {
      "name": "CVE-2024-46816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
    },
    {
      "name": "CVE-2024-11395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
    },
    {
      "name": "CVE-2024-49960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
    },
    {
      "name": "CVE-2024-50047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
    },
    {
      "name": "CVE-2024-50073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
    },
    {
      "name": "CVE-2024-11691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
    },
    {
      "name": "CVE-2024-11692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
    },
    {
      "name": "CVE-2024-11693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
    },
    {
      "name": "CVE-2024-11694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
    },
    {
      "name": "CVE-2024-11695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
    },
    {
      "name": "CVE-2024-11696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
    },
    {
      "name": "CVE-2024-11697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
    },
    {
      "name": "CVE-2024-11698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
    },
    {
      "name": "CVE-2024-11699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
    },
    {
      "name": "CVE-2024-11700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
    },
    {
      "name": "CVE-2024-11701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
    },
    {
      "name": "CVE-2024-11702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
    },
    {
      "name": "CVE-2024-11703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
    },
    {
      "name": "CVE-2024-11704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
    },
    {
      "name": "CVE-2024-11705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
    },
    {
      "name": "CVE-2024-11706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
    },
    {
      "name": "CVE-2024-11708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
    },
    {
      "name": "CVE-2024-50272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
    },
    {
      "name": "CVE-2024-50280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
    },
    {
      "name": "CVE-2024-11053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
    },
    {
      "name": "CVE-2024-10041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
    },
    {
      "name": "CVE-2024-10963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
    },
    {
      "name": "CVE-2024-47554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
    },
    {
      "name": "CVE-2024-49989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
    },
    {
      "name": "CVE-2024-50125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
    },
    {
      "name": "CVE-2024-53051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
    },
    {
      "name": "CVE-2024-53144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
    },
    {
      "name": "CVE-2024-8805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
    },
    {
      "name": "CVE-2025-0237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
    },
    {
      "name": "CVE-2025-0238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
    },
    {
      "name": "CVE-2025-0239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
    },
    {
      "name": "CVE-2025-0240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
    },
    {
      "name": "CVE-2025-0241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
    },
    {
      "name": "CVE-2025-0242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
    },
    {
      "name": "CVE-2025-0243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
    },
    {
      "name": "CVE-2025-0245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
    },
    {
      "name": "CVE-2025-0247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
    },
    {
      "name": "CVE-2025-0434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
    },
    {
      "name": "CVE-2025-0435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
    },
    {
      "name": "CVE-2025-0436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
    },
    {
      "name": "CVE-2025-0437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
    },
    {
      "name": "CVE-2025-0438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
    },
    {
      "name": "CVE-2025-0439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
    },
    {
      "name": "CVE-2025-0440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
    },
    {
      "name": "CVE-2025-0441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
    },
    {
      "name": "CVE-2025-0442",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
    },
    {
      "name": "CVE-2025-0443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
    },
    {
      "name": "CVE-2025-0446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
    },
    {
      "name": "CVE-2025-0447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
    },
    {
      "name": "CVE-2025-0448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
    },
    {
      "name": "CVE-2025-21523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
    },
    {
      "name": "CVE-2025-0612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
    },
    {
      "name": "CVE-2025-23083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
    },
    {
      "name": "CVE-2025-23084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
    },
    {
      "name": "CVE-2025-23085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
    },
    {
      "name": "CVE-2025-0938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
    },
    {
      "name": "CVE-2025-0444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
    },
    {
      "name": "CVE-2025-0445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
    },
    {
      "name": "CVE-2025-0451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
    },
    {
      "name": "CVE-2025-0762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
    },
    {
      "name": "CVE-2025-1009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
    },
    {
      "name": "CVE-2025-1010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
    },
    {
      "name": "CVE-2025-1011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
    },
    {
      "name": "CVE-2025-1012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
    },
    {
      "name": "CVE-2025-1013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
    },
    {
      "name": "CVE-2025-1014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
    },
    {
      "name": "CVE-2024-56664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
    },
    {
      "name": "CVE-2025-1016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
    },
    {
      "name": "CVE-2025-1017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
    },
    {
      "name": "CVE-2025-1018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
    },
    {
      "name": "CVE-2025-1019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
    },
    {
      "name": "CVE-2025-1020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    },
    {
      "name": "CVE-2025-0725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
    },
    {
      "name": "CVE-2024-47535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
    },
    {
      "name": "CVE-2024-50258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
    },
    {
      "name": "CVE-2024-53203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
    },
    {
      "name": "CVE-2024-53128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
    },
    {
      "name": "CVE-2025-0995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
    },
    {
      "name": "CVE-2025-0996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
    },
    {
      "name": "CVE-2025-0997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
    },
    {
      "name": "CVE-2025-0998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
    },
    {
      "name": "CVE-2024-13176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
    },
    {
      "name": "CVE-2025-1414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
    },
    {
      "name": "CVE-2025-0999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
    },
    {
      "name": "CVE-2025-1006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
    },
    {
      "name": "CVE-2025-1426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
    },
    {
      "name": "CVE-2024-56751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
    },
    {
      "name": "CVE-2023-39017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
    },
    {
      "name": "CVE-2025-1795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
    },
    {
      "name": "CVE-2025-1914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
    },
    {
      "name": "CVE-2025-1915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
    },
    {
      "name": "CVE-2025-1916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
    },
    {
      "name": "CVE-2025-1917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
    },
    {
      "name": "CVE-2025-1918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
    },
    {
      "name": "CVE-2025-1919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
    },
    {
      "name": "CVE-2025-1921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
    },
    {
      "name": "CVE-2025-1922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
    },
    {
      "name": "CVE-2025-1923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
    },
    {
      "name": "CVE-2025-1930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
    },
    {
      "name": "CVE-2025-1931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
    },
    {
      "name": "CVE-2025-1932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
    },
    {
      "name": "CVE-2025-1933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
    },
    {
      "name": "CVE-2025-1934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
    },
    {
      "name": "CVE-2025-1935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
    },
    {
      "name": "CVE-2025-1936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
    },
    {
      "name": "CVE-2025-1937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
    },
    {
      "name": "CVE-2025-1938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
    },
    {
      "name": "CVE-2025-1939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
    },
    {
      "name": "CVE-2025-1940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
    },
    {
      "name": "CVE-2025-1941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
    },
    {
      "name": "CVE-2025-1942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
    },
    {
      "name": "CVE-2025-1943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
    },
    {
      "name": "CVE-2025-1920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
    },
    {
      "name": "CVE-2025-2135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
    },
    {
      "name": "CVE-2025-2136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
    },
    {
      "name": "CVE-2025-2137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
    },
    {
      "name": "CVE-2025-24813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
    },
    {
      "name": "CVE-2024-6763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
    },
    {
      "name": "CVE-2022-49043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
    },
    {
      "name": "CVE-2024-45338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
    },
    {
      "name": "CVE-2024-51744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
    },
    {
      "name": "CVE-2025-24970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
    },
    {
      "name": "CVE-2025-25193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
    },
    {
      "name": "CVE-2024-45772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
    },
    {
      "name": "CVE-2025-2476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
    },
    {
      "name": "CVE-2025-2857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
    },
    {
      "name": "CVE-2024-45337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
    },
    {
      "name": "CVE-2025-22870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
    },
    {
      "name": "CVE-2025-2783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
    },
    {
      "name": "CVE-2022-49063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
    },
    {
      "name": "CVE-2022-49535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
    },
    {
      "name": "CVE-2024-56171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
    },
    {
      "name": "CVE-2025-27113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
    },
    {
      "name": "CVE-2025-3066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
    },
    {
      "name": "CVE-2025-3067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
    },
    {
      "name": "CVE-2025-3068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
    },
    {
      "name": "CVE-2025-3071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
    },
    {
      "name": "CVE-2025-3072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
    },
    {
      "name": "CVE-2025-3073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
    },
    {
      "name": "CVE-2025-3074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
    },
    {
      "name": "CVE-2025-3028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
    },
    {
      "name": "CVE-2025-3029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
    },
    {
      "name": "CVE-2025-3030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
    },
    {
      "name": "CVE-2025-3031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
    },
    {
      "name": "CVE-2025-3032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
    },
    {
      "name": "CVE-2025-3033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
    },
    {
      "name": "CVE-2025-3034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
    },
    {
      "name": "CVE-2025-3035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
    },
    {
      "name": "CVE-2024-54458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
    },
    {
      "name": "CVE-2025-3608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
    },
    {
      "name": "CVE-2025-21574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
    },
    {
      "name": "CVE-2025-21575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
    },
    {
      "name": "CVE-2025-21577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
    },
    {
      "name": "CVE-2025-21579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
    },
    {
      "name": "CVE-2025-21580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
    },
    {
      "name": "CVE-2025-21581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
    },
    {
      "name": "CVE-2025-21584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
    },
    {
      "name": "CVE-2025-21585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
    },
    {
      "name": "CVE-2025-21588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
    },
    {
      "name": "CVE-2025-30681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
    },
    {
      "name": "CVE-2025-30682",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
    },
    {
      "name": "CVE-2025-30683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
    },
    {
      "name": "CVE-2025-30684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
    },
    {
      "name": "CVE-2025-30685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
    },
    {
      "name": "CVE-2025-30687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
    },
    {
      "name": "CVE-2025-30688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
    },
    {
      "name": "CVE-2025-30689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
    },
    {
      "name": "CVE-2025-30693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
    },
    {
      "name": "CVE-2025-30695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
    },
    {
      "name": "CVE-2025-30696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
    },
    {
      "name": "CVE-2025-30699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
    },
    {
      "name": "CVE-2025-30703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
    },
    {
      "name": "CVE-2025-30704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
    },
    {
      "name": "CVE-2025-30705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
    },
    {
      "name": "CVE-2025-30715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
    },
    {
      "name": "CVE-2025-30721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
    },
    {
      "name": "CVE-2025-21839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
    },
    {
      "name": "CVE-2025-3619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
    },
    {
      "name": "CVE-2025-3620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
    },
    {
      "name": "CVE-2025-24928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
    },
    {
      "name": "CVE-2025-21941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
    },
    {
      "name": "CVE-2025-21956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
    },
    {
      "name": "CVE-2025-21957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
    },
    {
      "name": "CVE-2025-21959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
    },
    {
      "name": "CVE-2025-21962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
    },
    {
      "name": "CVE-2025-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
    },
    {
      "name": "CVE-2025-21964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
    },
    {
      "name": "CVE-2025-21968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
    },
    {
      "name": "CVE-2025-21970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
    },
    {
      "name": "CVE-2025-21975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
    },
    {
      "name": "CVE-2025-21981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
    },
    {
      "name": "CVE-2025-21991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
    },
    {
      "name": "CVE-2025-21992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
    },
    {
      "name": "CVE-2025-21994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
    },
    {
      "name": "CVE-2025-21996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
    },
    {
      "name": "CVE-2025-21999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
    },
    {
      "name": "CVE-2025-22004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
    },
    {
      "name": "CVE-2025-22005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
    },
    {
      "name": "CVE-2025-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
    },
    {
      "name": "CVE-2025-22008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
    },
    {
      "name": "CVE-2025-22010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
    },
    {
      "name": "CVE-2025-22014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
    },
    {
      "name": "CVE-2024-12798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
    },
    {
      "name": "CVE-2024-12801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
    },
    {
      "name": "CVE-2025-22868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
    },
    {
      "name": "CVE-2025-22871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
    },
    {
      "name": "CVE-2025-22235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
    },
    {
      "name": "CVE-2025-2312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
    },
    {
      "name": "CVE-2025-30204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
    },
    {
      "name": "CVE-2025-4050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
    },
    {
      "name": "CVE-2025-4051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
    },
    {
      "name": "CVE-2025-4052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
    },
    {
      "name": "CVE-2025-4096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
    },
    {
      "name": "CVE-2025-2817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
    },
    {
      "name": "CVE-2025-4082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
    },
    {
      "name": "CVE-2025-4083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
    },
    {
      "name": "CVE-2025-4085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
    },
    {
      "name": "CVE-2025-4087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
    },
    {
      "name": "CVE-2025-4088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
    },
    {
      "name": "CVE-2025-4089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
    },
    {
      "name": "CVE-2025-4090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
    },
    {
      "name": "CVE-2025-4091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
    },
    {
      "name": "CVE-2025-4092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
    },
    {
      "name": "CVE-2023-53034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
    },
    {
      "name": "CVE-2024-46742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
    },
    {
      "name": "CVE-2025-22027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
    },
    {
      "name": "CVE-2025-22035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
    },
    {
      "name": "CVE-2025-22044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
    },
    {
      "name": "CVE-2025-22045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
    },
    {
      "name": "CVE-2025-22050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
    },
    {
      "name": "CVE-2025-22054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
    },
    {
      "name": "CVE-2025-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
    },
    {
      "name": "CVE-2025-22056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
    },
    {
      "name": "CVE-2025-22060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
    },
    {
      "name": "CVE-2025-22063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
    },
    {
      "name": "CVE-2025-22066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
    },
    {
      "name": "CVE-2025-22071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
    },
    {
      "name": "CVE-2025-22073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
    },
    {
      "name": "CVE-2025-22075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
    },
    {
      "name": "CVE-2025-22079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
    },
    {
      "name": "CVE-2025-22081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
    },
    {
      "name": "CVE-2025-22086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
    },
    {
      "name": "CVE-2025-22089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
    },
    {
      "name": "CVE-2025-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
    },
    {
      "name": "CVE-2025-23136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
    },
    {
      "name": "CVE-2025-23138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
    },
    {
      "name": "CVE-2025-37785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
    },
    {
      "name": "CVE-2025-37838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
    },
    {
      "name": "CVE-2025-38152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
    },
    {
      "name": "CVE-2025-38575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
    },
    {
      "name": "CVE-2025-38637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
    },
    {
      "name": "CVE-2025-39728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
    },
    {
      "name": "CVE-2025-39735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
    },
    {
      "name": "CVE-2025-27516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
    },
    {
      "name": "CVE-2025-29087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
    },
    {
      "name": "CVE-2025-3277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
    },
    {
      "name": "CVE-2025-4609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
    },
    {
      "name": "CVE-2025-4664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
    },
    {
      "name": "CVE-2025-4372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
    },
    {
      "name": "CVE-2025-4516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
    },
    {
      "name": "CVE-2025-22233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
    },
    {
      "name": "CVE-2024-55549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
    },
    {
      "name": "CVE-2024-9287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
    },
    {
      "name": "CVE-2025-24855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
    },
    {
      "name": "CVE-2025-4918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
    },
    {
      "name": "CVE-2025-4919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
    },
    {
      "name": "CVE-2025-41232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
    },
    {
      "name": "CVE-2025-23165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
    },
    {
      "name": "CVE-2025-23166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
    },
    {
      "name": "CVE-2025-5063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
    },
    {
      "name": "CVE-2025-5064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
    },
    {
      "name": "CVE-2025-5065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
    },
    {
      "name": "CVE-2025-5066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
    },
    {
      "name": "CVE-2025-5067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
    },
    {
      "name": "CVE-2025-32414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
    },
    {
      "name": "CVE-2025-32415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
    },
    {
      "name": "CVE-2022-49728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2025-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
    },
    {
      "name": "CVE-2025-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
    },
    {
      "name": "CVE-2025-22062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-37749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
    },
    {
      "name": "CVE-2025-22869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
    },
    {
      "name": "CVE-2025-5263",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
    },
    {
      "name": "CVE-2025-5264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
    },
    {
      "name": "CVE-2025-5265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
    },
    {
      "name": "CVE-2025-5266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
    },
    {
      "name": "CVE-2025-5267",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
    },
    {
      "name": "CVE-2025-5268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
    },
    {
      "name": "CVE-2025-5270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
    },
    {
      "name": "CVE-2025-5271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
    },
    {
      "name": "CVE-2025-5272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
    },
    {
      "name": "CVE-2025-5281",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
    },
    {
      "name": "CVE-2025-5283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
    },
    {
      "name": "CVE-2025-46701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
    },
    {
      "name": "CVE-2025-22021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
    },
    {
      "name": "CVE-2025-23140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
    },
    {
      "name": "CVE-2025-23142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
    },
    {
      "name": "CVE-2025-23144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
    },
    {
      "name": "CVE-2025-23146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
    },
    {
      "name": "CVE-2025-23147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
    },
    {
      "name": "CVE-2025-23148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
    },
    {
      "name": "CVE-2025-23150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
    },
    {
      "name": "CVE-2025-23151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
    },
    {
      "name": "CVE-2025-23156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
    },
    {
      "name": "CVE-2025-23157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
    },
    {
      "name": "CVE-2025-23158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
    },
    {
      "name": "CVE-2025-23159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
    },
    {
      "name": "CVE-2025-23161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
    },
    {
      "name": "CVE-2025-23163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
    },
    {
      "name": "CVE-2025-37738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
    },
    {
      "name": "CVE-2025-37739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
    },
    {
      "name": "CVE-2025-37740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
    },
    {
      "name": "CVE-2025-37741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
    },
    {
      "name": "CVE-2025-37742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
    },
    {
      "name": "CVE-2025-37756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
    },
    {
      "name": "CVE-2025-37757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
    },
    {
      "name": "CVE-2025-37758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
    },
    {
      "name": "CVE-2025-37765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
    },
    {
      "name": "CVE-2025-37766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
    },
    {
      "name": "CVE-2025-37767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
    },
    {
      "name": "CVE-2025-37768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
    },
    {
      "name": "CVE-2025-37770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
    },
    {
      "name": "CVE-2025-37771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
    },
    {
      "name": "CVE-2025-37773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
    },
    {
      "name": "CVE-2025-37780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
    },
    {
      "name": "CVE-2025-37781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
    },
    {
      "name": "CVE-2025-37787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
    },
    {
      "name": "CVE-2025-37788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
    },
    {
      "name": "CVE-2025-37789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
    },
    {
      "name": "CVE-2025-37790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
    },
    {
      "name": "CVE-2025-37792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
    },
    {
      "name": "CVE-2025-37794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
    },
    {
      "name": "CVE-2025-37796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
    },
    {
      "name": "CVE-2025-37797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
    },
    {
      "name": "CVE-2025-37803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
    },
    {
      "name": "CVE-2025-37805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
    },
    {
      "name": "CVE-2025-37808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
    },
    {
      "name": "CVE-2025-37810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
    },
    {
      "name": "CVE-2025-37811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
    },
    {
      "name": "CVE-2025-37812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
    },
    {
      "name": "CVE-2025-37817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
    },
    {
      "name": "CVE-2025-37823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
    },
    {
      "name": "CVE-2025-37824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
    },
    {
      "name": "CVE-2025-37829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
    },
    {
      "name": "CVE-2025-37830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
    },
    {
      "name": "CVE-2025-37836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
    },
    {
      "name": "CVE-2025-37839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
    },
    {
      "name": "CVE-2025-37840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
    },
    {
      "name": "CVE-2025-37841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
    },
    {
      "name": "CVE-2025-37844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
    },
    {
      "name": "CVE-2025-37850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
    },
    {
      "name": "CVE-2025-37851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
    },
    {
      "name": "CVE-2025-37857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
    },
    {
      "name": "CVE-2025-37858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
    },
    {
      "name": "CVE-2025-37859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
    },
    {
      "name": "CVE-2025-37862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
    },
    {
      "name": "CVE-2025-37867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
    },
    {
      "name": "CVE-2025-37871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
    },
    {
      "name": "CVE-2025-37875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
    },
    {
      "name": "CVE-2025-37881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
    },
    {
      "name": "CVE-2025-37883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
    },
    {
      "name": "CVE-2025-37885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
    },
    {
      "name": "CVE-2025-37889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
    },
    {
      "name": "CVE-2025-37892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
    },
    {
      "name": "CVE-2025-37937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
    },
    {
      "name": "CVE-2025-37940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
    },
    {
      "name": "CVE-2025-37982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
    },
    {
      "name": "CVE-2025-37983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
    },
    {
      "name": "CVE-2025-37985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
    },
    {
      "name": "CVE-2025-37989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
    },
    {
      "name": "CVE-2025-37819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
    },
    {
      "name": "CVE-2025-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
    },
    {
      "name": "CVE-2025-37905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
    },
    {
      "name": "CVE-2025-37909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
    },
    {
      "name": "CVE-2025-37911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
    },
    {
      "name": "CVE-2025-37912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
    },
    {
      "name": "CVE-2025-37913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
    },
    {
      "name": "CVE-2025-37914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
    },
    {
      "name": "CVE-2025-37915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
    },
    {
      "name": "CVE-2025-37923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
    },
    {
      "name": "CVE-2025-37927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
    },
    {
      "name": "CVE-2025-37930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
    },
    {
      "name": "CVE-2025-37932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
    },
    {
      "name": "CVE-2025-37949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
    },
    {
      "name": "CVE-2025-37964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
    },
    {
      "name": "CVE-2025-37967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
    },
    {
      "name": "CVE-2025-37969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
    },
    {
      "name": "CVE-2025-37970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
    },
    {
      "name": "CVE-2025-37990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
    },
    {
      "name": "CVE-2025-37991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
    },
    {
      "name": "CVE-2025-5068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
    },
    {
      "name": "CVE-2025-5419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
    },
    {
      "name": "CVE-2025-27144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
    },
    {
      "name": "CVE-2025-49709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
    },
    {
      "name": "CVE-2025-49710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
    },
    {
      "name": "CVE-2023-6779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
    },
    {
      "name": "CVE-2023-6780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
    },
    {
      "name": "CVE-2024-12133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
    },
    {
      "name": "CVE-2024-12243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
    },
    {
      "name": "CVE-2024-2236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
    },
    {
      "name": "CVE-2024-56433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
    },
    {
      "name": "CVE-2025-0395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
    },
    {
      "name": "CVE-2025-1390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
    },
    {
      "name": "CVE-2025-29088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
    },
    {
      "name": "CVE-2025-31115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
    },
    {
      "name": "CVE-2025-4598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
    },
    {
      "name": "CVE-2025-5958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
    },
    {
      "name": "CVE-2025-5959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
    },
    {
      "name": "CVE-2025-41234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
    },
    {
      "name": "CVE-2025-49146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
    },
    {
      "name": "CVE-2025-48988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
    },
    {
      "name": "CVE-2025-49124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
    },
    {
      "name": "CVE-2025-49125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
    },
    {
      "name": "CVE-2025-6191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
    },
    {
      "name": "CVE-2025-6192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
    },
    {
      "name": "CVE-2024-53427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
    },
    {
      "name": "CVE-2024-56406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
    },
    {
      "name": "CVE-2025-22872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
    },
    {
      "name": "CVE-2025-4802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
    },
    {
      "name": "CVE-2022-49168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
    },
    {
      "name": "CVE-2025-37998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
    },
    {
      "name": "CVE-2023-42366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
    },
    {
      "name": "CVE-2025-6424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
    },
    {
      "name": "CVE-2025-6425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
    },
    {
      "name": "CVE-2025-6426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
    },
    {
      "name": "CVE-2025-6427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
    },
    {
      "name": "CVE-2025-6429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
    },
    {
      "name": "CVE-2025-6430",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
    },
    {
      "name": "CVE-2025-6432",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
    },
    {
      "name": "CVE-2025-6433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
    },
    {
      "name": "CVE-2025-6434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
    },
    {
      "name": "CVE-2025-6020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
    },
    {
      "name": "CVE-2025-6555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
    },
    {
      "name": "CVE-2025-6556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
    },
    {
      "name": "CVE-2025-6557",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
    },
    {
      "name": "CVE-2025-6435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
    },
    {
      "name": "CVE-2025-6436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
    },
    {
      "name": "CVE-2025-6554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
    },
    {
      "name": "CVE-2025-6021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
    },
    {
      "name": "CVE-2022-49636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
    },
    {
      "name": "CVE-2025-37997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
    },
    {
      "name": "CVE-2025-38000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
    },
    {
      "name": "CVE-2025-38001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
    },
    {
      "name": "CVE-2025-32462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
    },
    {
      "name": "CVE-2025-52520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
    },
    {
      "name": "CVE-2025-53506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
    },
    {
      "name": "CVE-2024-47081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
    },
    {
      "name": "CVE-2025-3576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
    },
    {
      "name": "CVE-2025-47268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
    },
    {
      "name": "CVE-2025-37992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
    },
    {
      "name": "CVE-2025-37994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
    },
    {
      "name": "CVE-2025-37995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
    },
    {
      "name": "CVE-2025-38005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
    },
    {
      "name": "CVE-2025-38009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
    },
    {
      "name": "CVE-2025-38023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
    },
    {
      "name": "CVE-2025-38024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
    },
    {
      "name": "CVE-2025-38083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
    },
    {
      "name": "CVE-2025-22227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
    },
    {
      "name": "CVE-2025-6558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
    },
    {
      "name": "CVE-2025-7656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
    },
    {
      "name": "CVE-2025-7657",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
    },
    {
      "name": "CVE-2025-30749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
    },
    {
      "name": "CVE-2025-30754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
    },
    {
      "name": "CVE-2025-50059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
    },
    {
      "name": "CVE-2025-50106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
    },
    {
      "name": "CVE-2025-50088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
    },
    {
      "name": "CVE-2025-48734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
    },
    {
      "name": "CVE-2022-21546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
    },
    {
      "name": "CVE-2020-16156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
    },
    {
      "name": "CVE-2025-8010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
    },
    {
      "name": "CVE-2025-8011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
    },
    {
      "name": "CVE-2025-8027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
    },
    {
      "name": "CVE-2025-8028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
    },
    {
      "name": "CVE-2025-8029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
    },
    {
      "name": "CVE-2025-8030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
    },
    {
      "name": "CVE-2025-8031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
    },
    {
      "name": "CVE-2025-8032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
    },
    {
      "name": "CVE-2025-8033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
    },
    {
      "name": "CVE-2025-8034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
    },
    {
      "name": "CVE-2025-8035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
    },
    {
      "name": "CVE-2025-8036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
    },
    {
      "name": "CVE-2025-8037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
    },
    {
      "name": "CVE-2025-8038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
    },
    {
      "name": "CVE-2025-8039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
    },
    {
      "name": "CVE-2025-8040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
    },
    {
      "name": "CVE-2025-8041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
    },
    {
      "name": "CVE-2025-8043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
    },
    {
      "name": "CVE-2025-8044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
    },
    {
      "name": "CVE-2024-23337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
    },
    {
      "name": "CVE-2024-45339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
    },
    {
      "name": "CVE-2024-47611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
    },
    {
      "name": "CVE-2025-0913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
    },
    {
      "name": "CVE-2025-22874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
    },
    {
      "name": "CVE-2025-32988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
    },
    {
      "name": "CVE-2025-32989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
    },
    {
      "name": "CVE-2025-32990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
    },
    {
      "name": "CVE-2025-38177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
    },
    {
      "name": "CVE-2025-4673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
    },
    {
      "name": "CVE-2025-48060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
    },
    {
      "name": "CVE-2025-4877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
    },
    {
      "name": "CVE-2025-4878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
    },
    {
      "name": "CVE-2025-48924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
    },
    {
      "name": "CVE-2025-50181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
    },
    {
      "name": "CVE-2025-5318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
    },
    {
      "name": "CVE-2025-5372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
    },
    {
      "name": "CVE-2025-5914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
    },
    {
      "name": "CVE-2025-5915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
    },
    {
      "name": "CVE-2025-5916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
    },
    {
      "name": "CVE-2025-5917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
    },
    {
      "name": "CVE-2025-6069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
    },
    {
      "name": "CVE-2025-6395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
    },
    {
      "name": "CVE-2025-38094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
    },
    {
      "name": "CVE-2025-8194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
    },
    {
      "name": "CVE-2025-8292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
    },
    {
      "name": "CVE-2025-7424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
    },
    {
      "name": "CVE-2025-7425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
    },
    {
      "name": "CVE-2025-50182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
    },
    {
      "name": "CVE-2025-5889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
    },
    {
      "name": "CVE-2025-8576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
    },
    {
      "name": "CVE-2025-8577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
    },
    {
      "name": "CVE-2025-8578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
    },
    {
      "name": "CVE-2025-8579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
    },
    {
      "name": "CVE-2025-8580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
    },
    {
      "name": "CVE-2025-8581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
    },
    {
      "name": "CVE-2025-8582",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
    },
    {
      "name": "CVE-2025-8583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
    },
    {
      "name": "CVE-2025-27210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
    },
    {
      "name": "CVE-2025-27817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
    },
    {
      "name": "CVE-2025-27818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
    },
    {
      "name": "CVE-2025-8879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
    },
    {
      "name": "CVE-2025-8880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
    },
    {
      "name": "CVE-2025-8881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
    },
    {
      "name": "CVE-2025-8882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
    },
    {
      "name": "CVE-2025-8901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
    },
    {
      "name": "CVE-2025-48989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
    },
    {
      "name": "CVE-2025-7339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
    },
    {
      "name": "CVE-2025-7783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
    },
    {
      "name": "CVE-2021-32256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
    },
    {
      "name": "CVE-2024-25260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
    },
    {
      "name": "CVE-2025-1371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
    },
    {
      "name": "CVE-2025-1376",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
    },
    {
      "name": "CVE-2025-1377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
    },
    {
      "name": "CVE-2025-47273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
    },
    {
      "name": "CVE-2025-48964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
    },
    {
      "name": "CVE-2025-49794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
    },
    {
      "name": "CVE-2025-49796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
    },
    {
      "name": "CVE-2025-41242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
    },
    {
      "name": "CVE-2025-9132",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
    },
    {
      "name": "CVE-2025-54988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
    },
    {
      "name": "CVE-2025-6965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
    },
    {
      "name": "CVE-2024-13009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
    },
    {
      "name": "CVE-2025-55668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
    },
    {
      "name": "CVE-2025-4674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
    },
    {
      "name": "CVE-2025-47907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
    },
    {
      "name": "CVE-2025-52999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
    },
    {
      "name": "CVE-2025-55163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
    },
    {
      "name": "CVE-2025-8941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
    },
    {
      "name": "CVE-2025-9288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
    },
    {
      "name": "CVE-2005-2541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
    },
    {
      "name": "CVE-2008-5727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
    },
    {
      "name": "CVE-2008-5728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
    },
    {
      "name": "CVE-2008-5729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
    },
    {
      "name": "CVE-2008-5730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
    },
    {
      "name": "CVE-2008-5742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
    },
    {
      "name": "CVE-2011-3374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
    },
    {
      "name": "CVE-2014-4715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
    },
    {
      "name": "CVE-2015-2214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
    },
    {
      "name": "CVE-2016-0682",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
    },
    {
      "name": "CVE-2016-0689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
    },
    {
      "name": "CVE-2016-0692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
    },
    {
      "name": "CVE-2016-0694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
    },
    {
      "name": "CVE-2016-2149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
    },
    {
      "name": "CVE-2016-2160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
    },
    {
      "name": "CVE-2016-3418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
    },
    {
      "name": "CVE-2017-10140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
    },
    {
      "name": "CVE-2017-12195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
    },
    {
      "name": "CVE-2017-12629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
    },
    {
      "name": "CVE-2017-3604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
    },
    {
      "name": "CVE-2017-3605",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
    },
    {
      "name": "CVE-2017-3606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
    },
    {
      "name": "CVE-2017-3607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
    },
    {
      "name": "CVE-2017-3608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
    },
    {
      "name": "CVE-2017-3609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
    },
    {
      "name": "CVE-2017-3610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
    },
    {
      "name": "CVE-2017-3611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
    },
    {
      "name": "CVE-2017-3612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
    },
    {
      "name": "CVE-2017-3613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
    },
    {
      "name": "CVE-2017-3614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
    },
    {
      "name": "CVE-2017-3615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
    },
    {
      "name": "CVE-2017-3616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
    },
    {
      "name": "CVE-2017-3617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
    },
    {
      "name": "CVE-2018-1000169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
    },
    {
      "name": "CVE-2018-1196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
    },
    {
      "name": "CVE-2018-1273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
    },
    {
      "name": "CVE-2019-10782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
    },
    {
      "name": "CVE-2019-9658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
    },
    {
      "name": "CVE-2020-2981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
    },
    {
      "name": "CVE-2021-20298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
    },
    {
      "name": "CVE-2021-20304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
    },
    {
      "name": "CVE-2021-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
    },
    {
      "name": "CVE-2021-23169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
    },
    {
      "name": "CVE-2021-3236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
    },
    {
      "name": "CVE-2022-0635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
    },
    {
      "name": "CVE-2022-0667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
    },
    {
      "name": "CVE-2022-3219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
    },
    {
      "name": "CVE-2022-39046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
    },
    {
      "name": "CVE-2022-42010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
    },
    {
      "name": "CVE-2022-42011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
    },
    {
      "name": "CVE-2022-42012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
    },
    {
      "name": "CVE-2022-44638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
    },
    {
      "name": "CVE-2023-31437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
    },
    {
      "name": "CVE-2023-31438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
    },
    {
      "name": "CVE-2023-31439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
    },
    {
      "name": "CVE-2023-37769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
    },
    {
      "name": "CVE-2023-39810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
    },
    {
      "name": "CVE-2023-4156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
    },
    {
      "name": "CVE-2023-4320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
    },
    {
      "name": "CVE-2023-43785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
    },
    {
      "name": "CVE-2023-43786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
    },
    {
      "name": "CVE-2023-43787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
    },
    {
      "name": "CVE-2023-46129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
    },
    {
      "name": "CVE-2023-47039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
    },
    {
      "name": "CVE-2023-5189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
    },
    {
      "name": "CVE-2024-11584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
    },
    {
      "name": "CVE-2024-21742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
    },
    {
      "name": "CVE-2024-22047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
    },
    {
      "name": "CVE-2024-2397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
    },
    {
      "name": "CVE-2024-26462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
    },
    {
      "name": "CVE-2024-31047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
    },
    {
      "name": "CVE-2024-3220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
    },
    {
      "name": "CVE-2024-58251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
    },
    {
      "name": "CVE-2024-6174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
    },
    {
      "name": "CVE-2024-7012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
    },
    {
      "name": "CVE-2025-1352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
    },
    {
      "name": "CVE-2025-1365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
    },
    {
      "name": "CVE-2025-1372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
    },
    {
      "name": "CVE-2025-24294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
    },
    {
      "name": "CVE-2025-26519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
    },
    {
      "name": "CVE-2025-27587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
    },
    {
      "name": "CVE-2025-30258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
    },
    {
      "name": "CVE-2025-31672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
    },
    {
      "name": "CVE-2025-40909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
    },
    {
      "name": "CVE-2025-43857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
    },
    {
      "name": "CVE-2025-45582",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
    },
    {
      "name": "CVE-2025-45768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
    },
    {
      "name": "CVE-2025-46392",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
    },
    {
      "name": "CVE-2025-46394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
    },
    {
      "name": "CVE-2025-49795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
    },
    {
      "name": "CVE-2025-5115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
    },
    {
      "name": "CVE-2025-5222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
    },
    {
      "name": "CVE-2025-5278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
    },
    {
      "name": "CVE-2025-53864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
    },
    {
      "name": "CVE-2025-6170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
    },
    {
      "name": "CVE-2025-6297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
    },
    {
      "name": "CVE-2025-7962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
    },
    {
      "name": "CVE-2025-8058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
    },
    {
      "name": "CVE-2025-8262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
    },
    {
      "name": "CVE-2025-8732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
    },
    {
      "name": "CVE-2025-8885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
    },
    {
      "name": "CVE-2025-8916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
    },
    {
      "name": "CVE-2025-9179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
    },
    {
      "name": "CVE-2025-9180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
    },
    {
      "name": "CVE-2025-9181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
    },
    {
      "name": "CVE-2025-9182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
    },
    {
      "name": "CVE-2025-9183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
    },
    {
      "name": "CVE-2025-9184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
    },
    {
      "name": "CVE-2025-9185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
    },
    {
      "name": "CVE-2025-9187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
    },
    {
      "name": "CVE-2025-9308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
    }
  ],
  "initial_release_date": "2025-09-05T00:00:00",
  "last_revision_date": "2025-09-05T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0756",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-09-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
    }
  ]
}
  rhsa-2025:12083
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for icu is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The International Components for Unicode (ICU) library provides robust and full-featured Unicode services.\n\nSecurity Fix(es):\n\n* icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2025:12083",
        "url": "https://access.redhat.com/errata/RHSA-2025:12083"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2368600",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368600"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12083.json"
      }
    ],
    "title": "Red Hat Security Advisory: icu security update",
    "tracking": {
      "current_release_date": "2025-09-25T15:14:41+00:00",
      "generator": {
        "date": "2025-09-25T15:14:41+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2025:12083",
      "initial_release_date": "2025-07-29T12:31:05+00:00",
      "revision_history": [
        {
          "date": "2025-07-29T12:31:05+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-07-29T12:31:05+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T15:14:41+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.6.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                  "product_id": "BaseOS-9.6.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_6.aarch64",
                "product": {
                  "name": "icu-0:67.1-10.el9_6.aarch64",
                  "product_id": "icu-0:67.1-10.el9_6.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_6?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_6.aarch64",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_6.aarch64",
                  "product_id": "libicu-devel-0:67.1-10.el9_6.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_6?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_6.aarch64",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_6.aarch64",
                  "product_id": "icu-debugsource-0:67.1-10.el9_6.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_6?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_6.aarch64",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_6.aarch64",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_6.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_6?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_6.aarch64",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_6.aarch64",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_6.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_6?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.aarch64",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.aarch64",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_6.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_6?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_6.aarch64",
                "product": {
                  "name": "libicu-0:67.1-10.el9_6.aarch64",
                  "product_id": "libicu-0:67.1-10.el9_6.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_6?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_6.ppc64le",
                "product": {
                  "name": "icu-0:67.1-10.el9_6.ppc64le",
                  "product_id": "icu-0:67.1-10.el9_6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_6.ppc64le",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_6.ppc64le",
                  "product_id": "libicu-devel-0:67.1-10.el9_6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_6.ppc64le",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_6.ppc64le",
                  "product_id": "icu-debugsource-0:67.1-10.el9_6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_6.ppc64le",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_6.ppc64le",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_6.ppc64le",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_6.ppc64le",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.ppc64le",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.ppc64le",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_6.ppc64le",
                "product": {
                  "name": "libicu-0:67.1-10.el9_6.ppc64le",
                  "product_id": "libicu-0:67.1-10.el9_6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_6?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_6.x86_64",
                "product": {
                  "name": "icu-0:67.1-10.el9_6.x86_64",
                  "product_id": "icu-0:67.1-10.el9_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_6.x86_64",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_6.x86_64",
                  "product_id": "libicu-devel-0:67.1-10.el9_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_6.x86_64",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_6.x86_64",
                  "product_id": "icu-debugsource-0:67.1-10.el9_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_6.x86_64",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_6.x86_64",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_6.x86_64",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_6.x86_64",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.x86_64",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.x86_64",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_6.x86_64",
                "product": {
                  "name": "libicu-0:67.1-10.el9_6.x86_64",
                  "product_id": "libicu-0:67.1-10.el9_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_6.i686",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_6.i686",
                  "product_id": "libicu-devel-0:67.1-10.el9_6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_6.i686",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_6.i686",
                  "product_id": "icu-debugsource-0:67.1-10.el9_6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_6.i686",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_6.i686",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_6.i686",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_6.i686",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.i686",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.i686",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_6.i686",
                "product": {
                  "name": "libicu-0:67.1-10.el9_6.i686",
                  "product_id": "libicu-0:67.1-10.el9_6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_6.s390x",
                "product": {
                  "name": "icu-0:67.1-10.el9_6.s390x",
                  "product_id": "icu-0:67.1-10.el9_6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_6.s390x",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_6.s390x",
                  "product_id": "libicu-devel-0:67.1-10.el9_6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_6.s390x",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_6.s390x",
                  "product_id": "icu-debugsource-0:67.1-10.el9_6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_6.s390x",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_6.s390x",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_6.s390x",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_6.s390x",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.s390x",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.s390x",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_6.s390x",
                "product": {
                  "name": "libicu-0:67.1-10.el9_6.s390x",
                  "product_id": "libicu-0:67.1-10.el9_6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_6?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_6.src",
                "product": {
                  "name": "icu-0:67.1-10.el9_6.src",
                  "product_id": "icu-0:67.1-10.el9_6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.aarch64"
        },
        "product_reference": "icu-0:67.1-10.el9_6.aarch64",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.ppc64le"
        },
        "product_reference": "icu-0:67.1-10.el9_6.ppc64le",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.s390x"
        },
        "product_reference": "icu-0:67.1-10.el9_6.s390x",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.src"
        },
        "product_reference": "icu-0:67.1-10.el9_6.src",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.x86_64"
        },
        "product_reference": "icu-0:67.1-10.el9_6.x86_64",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.aarch64"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_6.aarch64",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.i686"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_6.i686",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.ppc64le"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_6.ppc64le",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.s390x"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_6.s390x",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.x86_64"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_6.x86_64",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.aarch64"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_6.aarch64",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.i686"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_6.i686",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.ppc64le"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_6.ppc64le",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.s390x"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_6.s390x",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.x86_64"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_6.x86_64",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.aarch64"
        },
        "product_reference": "libicu-0:67.1-10.el9_6.aarch64",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.i686"
        },
        "product_reference": "libicu-0:67.1-10.el9_6.i686",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.ppc64le"
        },
        "product_reference": "libicu-0:67.1-10.el9_6.ppc64le",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.s390x"
        },
        "product_reference": "libicu-0:67.1-10.el9_6.s390x",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.x86_64"
        },
        "product_reference": "libicu-0:67.1-10.el9_6.x86_64",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.aarch64"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_6.aarch64",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.i686"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_6.i686",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.ppc64le"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_6.ppc64le",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.s390x"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_6.s390x",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.x86_64"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_6.x86_64",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.aarch64"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_6.aarch64",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.i686"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_6.i686",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.ppc64le"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_6.ppc64le",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.s390x"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_6.s390x",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.x86_64"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_6.x86_64",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.aarch64"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_6.aarch64",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.i686"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_6.i686",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.ppc64le"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_6.ppc64le",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.s390x"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_6.s390x",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.x86_64"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_6.x86_64",
        "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.aarch64"
        },
        "product_reference": "icu-0:67.1-10.el9_6.aarch64",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.ppc64le"
        },
        "product_reference": "icu-0:67.1-10.el9_6.ppc64le",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.s390x"
        },
        "product_reference": "icu-0:67.1-10.el9_6.s390x",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_6.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.src"
        },
        "product_reference": "icu-0:67.1-10.el9_6.src",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.x86_64"
        },
        "product_reference": "icu-0:67.1-10.el9_6.x86_64",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.aarch64"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_6.aarch64",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.i686"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_6.i686",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.ppc64le"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_6.ppc64le",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.s390x"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_6.s390x",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.x86_64"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_6.x86_64",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.aarch64"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_6.aarch64",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.i686"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_6.i686",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.ppc64le"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_6.ppc64le",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.s390x"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_6.s390x",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.x86_64"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_6.x86_64",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.aarch64"
        },
        "product_reference": "libicu-0:67.1-10.el9_6.aarch64",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.i686"
        },
        "product_reference": "libicu-0:67.1-10.el9_6.i686",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.ppc64le"
        },
        "product_reference": "libicu-0:67.1-10.el9_6.ppc64le",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.s390x"
        },
        "product_reference": "libicu-0:67.1-10.el9_6.s390x",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.x86_64"
        },
        "product_reference": "libicu-0:67.1-10.el9_6.x86_64",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.aarch64"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_6.aarch64",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.i686"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_6.i686",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.ppc64le"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_6.ppc64le",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.s390x"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_6.s390x",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.x86_64"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_6.x86_64",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.aarch64"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_6.aarch64",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.i686"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_6.i686",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.ppc64le"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_6.ppc64le",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.s390x"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_6.s390x",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.x86_64"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_6.x86_64",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.aarch64"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_6.aarch64",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.i686"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_6.i686",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.ppc64le"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_6.ppc64le",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.s390x"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_6.s390x",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.x86_64"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_6.x86_64",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-5222",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2025-05-26T13:39:54.361000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2368600"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the \u0027subtag\u0027 struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "icu: Stack buffer overflow in the SRBRoot::addTag function",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat follows best practice and federal requirements for least privilege, allowing only specific processes to be run with isolated accounts specific to team and federal platforms that have limited privileges that are only used for a single task. The environment leverages file integrity checks and malicious code protections, such as IPS/IDS and antimalware solutions, to help detect and prevent malicious code that attempts to exploit buffer overflow vulnerabilities. Robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.aarch64",
          "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.ppc64le",
          "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.s390x",
          "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.src",
          "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.x86_64",
          "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.aarch64",
          "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.i686",
          "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.ppc64le",
          "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.s390x",
          "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.x86_64",
          "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.aarch64",
          "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.i686",
          "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.ppc64le",
          "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.s390x",
          "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.x86_64",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.aarch64",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.i686",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.ppc64le",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.s390x",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.x86_64",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.aarch64",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.i686",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.ppc64le",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.s390x",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.x86_64",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.aarch64",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.i686",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.ppc64le",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.s390x",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.x86_64",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.aarch64",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.i686",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.ppc64le",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.s390x",
          "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.x86_64",
          "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.aarch64",
          "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.ppc64le",
          "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.s390x",
          "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.src",
          "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.x86_64",
          "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.aarch64",
          "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.i686",
          "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.ppc64le",
          "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.s390x",
          "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.x86_64",
          "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.aarch64",
          "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.i686",
          "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.ppc64le",
          "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.s390x",
          "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.x86_64",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.aarch64",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.i686",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.ppc64le",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.s390x",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.x86_64",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.aarch64",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.i686",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.ppc64le",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.s390x",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.x86_64",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.aarch64",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.i686",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.ppc64le",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.s390x",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.x86_64",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.aarch64",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.i686",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.ppc64le",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.s390x",
          "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-5222"
        },
        {
          "category": "external",
          "summary": "RHBZ#2368600",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368600"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-5222",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5222",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5222"
        }
      ],
      "release_date": "2024-11-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-29T12:31:05+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.src",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.src",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12083"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.src",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.src",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.src",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.x86_64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.aarch64",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.i686",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.ppc64le",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.s390x",
            "AppStream-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.src",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debuginfo-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:icu-debugsource-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-debuginfo-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-0:67.1-10.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.aarch64",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.i686",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.ppc64le",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.s390x",
            "BaseOS-9.6.0.Z.MAIN.EUS:libicu-devel-debuginfo-0:67.1-10.el9_6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "icu: Stack buffer overflow in the SRBRoot::addTag function"
    }
  ]
}
  rhsa-2025:12332
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for icu is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The International Components for Unicode (ICU) library provides robust and full-featured Unicode services.\n\nSecurity Fix(es):\n\n* icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2025:12332",
        "url": "https://access.redhat.com/errata/RHSA-2025:12332"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2368600",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368600"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12332.json"
      }
    ],
    "title": "Red Hat Security Advisory: icu security update",
    "tracking": {
      "current_release_date": "2025-09-25T15:15:05+00:00",
      "generator": {
        "date": "2025-09-25T15:15:05+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2025:12332",
      "initial_release_date": "2025-07-31T04:59:19+00:00",
      "revision_history": [
        {
          "date": "2025-07-31T04:59:19+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-07-31T04:59:19+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T15:15:05+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
                  "product_id": "AppStream-9.4.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
                  "product_id": "BaseOS-9.4.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:9.4::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_4.aarch64",
                "product": {
                  "name": "icu-0:67.1-10.el9_4.aarch64",
                  "product_id": "icu-0:67.1-10.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_4.aarch64",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_4.aarch64",
                  "product_id": "libicu-devel-0:67.1-10.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_4.aarch64",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_4.aarch64",
                  "product_id": "icu-debugsource-0:67.1-10.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_4.aarch64",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_4.aarch64",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_4.aarch64",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_4.aarch64",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.aarch64",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.aarch64",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_4.aarch64",
                "product": {
                  "name": "libicu-0:67.1-10.el9_4.aarch64",
                  "product_id": "libicu-0:67.1-10.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_4?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_4.ppc64le",
                "product": {
                  "name": "icu-0:67.1-10.el9_4.ppc64le",
                  "product_id": "icu-0:67.1-10.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_4.ppc64le",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_4.ppc64le",
                  "product_id": "libicu-devel-0:67.1-10.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_4.ppc64le",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_4.ppc64le",
                  "product_id": "icu-debugsource-0:67.1-10.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_4.ppc64le",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_4.ppc64le",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_4.ppc64le",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_4.ppc64le",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.ppc64le",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.ppc64le",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_4.ppc64le",
                "product": {
                  "name": "libicu-0:67.1-10.el9_4.ppc64le",
                  "product_id": "libicu-0:67.1-10.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_4?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_4.x86_64",
                "product": {
                  "name": "icu-0:67.1-10.el9_4.x86_64",
                  "product_id": "icu-0:67.1-10.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_4.x86_64",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_4.x86_64",
                  "product_id": "libicu-devel-0:67.1-10.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_4.x86_64",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_4.x86_64",
                  "product_id": "icu-debugsource-0:67.1-10.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_4.x86_64",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_4.x86_64",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_4.x86_64",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_4.x86_64",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.x86_64",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.x86_64",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_4.x86_64",
                "product": {
                  "name": "libicu-0:67.1-10.el9_4.x86_64",
                  "product_id": "libicu-0:67.1-10.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_4.i686",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_4.i686",
                  "product_id": "libicu-devel-0:67.1-10.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_4?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_4.i686",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_4.i686",
                  "product_id": "icu-debugsource-0:67.1-10.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_4?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_4.i686",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_4.i686",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_4?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_4.i686",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_4.i686",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_4?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.i686",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.i686",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_4?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_4.i686",
                "product": {
                  "name": "libicu-0:67.1-10.el9_4.i686",
                  "product_id": "libicu-0:67.1-10.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_4?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_4.s390x",
                "product": {
                  "name": "icu-0:67.1-10.el9_4.s390x",
                  "product_id": "icu-0:67.1-10.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_4.s390x",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_4.s390x",
                  "product_id": "libicu-devel-0:67.1-10.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_4.s390x",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_4.s390x",
                  "product_id": "icu-debugsource-0:67.1-10.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_4.s390x",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_4.s390x",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_4.s390x",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_4.s390x",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.s390x",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.s390x",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_4.s390x",
                "product": {
                  "name": "libicu-0:67.1-10.el9_4.s390x",
                  "product_id": "libicu-0:67.1-10.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_4?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_4.src",
                "product": {
                  "name": "icu-0:67.1-10.el9_4.src",
                  "product_id": "icu-0:67.1-10.el9_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.aarch64"
        },
        "product_reference": "icu-0:67.1-10.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.ppc64le"
        },
        "product_reference": "icu-0:67.1-10.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.s390x"
        },
        "product_reference": "icu-0:67.1-10.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.src"
        },
        "product_reference": "icu-0:67.1-10.el9_4.src",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.x86_64"
        },
        "product_reference": "icu-0:67.1-10.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.aarch64"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.i686"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.ppc64le"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.s390x"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.x86_64"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.aarch64"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.i686"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.ppc64le"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.s390x"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.x86_64"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.aarch64"
        },
        "product_reference": "libicu-0:67.1-10.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.i686"
        },
        "product_reference": "libicu-0:67.1-10.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.ppc64le"
        },
        "product_reference": "libicu-0:67.1-10.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.s390x"
        },
        "product_reference": "libicu-0:67.1-10.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.x86_64"
        },
        "product_reference": "libicu-0:67.1-10.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.aarch64"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.i686"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.ppc64le"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.s390x"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.x86_64"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.aarch64"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.i686"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.ppc64le"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.s390x"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.x86_64"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.aarch64"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.i686"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.ppc64le"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.s390x"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
          "product_id": "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.x86_64"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.aarch64"
        },
        "product_reference": "icu-0:67.1-10.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.ppc64le"
        },
        "product_reference": "icu-0:67.1-10.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.s390x"
        },
        "product_reference": "icu-0:67.1-10.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.src"
        },
        "product_reference": "icu-0:67.1-10.el9_4.src",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.x86_64"
        },
        "product_reference": "icu-0:67.1-10.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.aarch64"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.i686"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.ppc64le"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.s390x"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.x86_64"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.aarch64"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.i686"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.ppc64le"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.s390x"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.x86_64"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.aarch64"
        },
        "product_reference": "libicu-0:67.1-10.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.i686"
        },
        "product_reference": "libicu-0:67.1-10.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.ppc64le"
        },
        "product_reference": "libicu-0:67.1-10.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.s390x"
        },
        "product_reference": "libicu-0:67.1-10.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.x86_64"
        },
        "product_reference": "libicu-0:67.1-10.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.aarch64"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.i686"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.ppc64le"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.s390x"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.x86_64"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.aarch64"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.i686"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.ppc64le"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.s390x"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.x86_64"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.aarch64"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.i686"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.ppc64le"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.s390x"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
          "product_id": "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.x86_64"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-5222",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2025-05-26T13:39:54.361000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2368600"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the \u0027subtag\u0027 struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "icu: Stack buffer overflow in the SRBRoot::addTag function",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat follows best practice and federal requirements for least privilege, allowing only specific processes to be run with isolated accounts specific to team and federal platforms that have limited privileges that are only used for a single task. The environment leverages file integrity checks and malicious code protections, such as IPS/IDS and antimalware solutions, to help detect and prevent malicious code that attempts to exploit buffer overflow vulnerabilities. Robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.aarch64",
          "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.ppc64le",
          "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.s390x",
          "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.src",
          "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.x86_64",
          "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.aarch64",
          "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.i686",
          "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.ppc64le",
          "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.s390x",
          "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.x86_64",
          "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.aarch64",
          "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.i686",
          "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.ppc64le",
          "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.s390x",
          "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.x86_64",
          "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.aarch64",
          "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.i686",
          "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.ppc64le",
          "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.s390x",
          "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.x86_64",
          "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.aarch64",
          "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.i686",
          "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.ppc64le",
          "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.s390x",
          "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.x86_64",
          "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.aarch64",
          "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.i686",
          "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.ppc64le",
          "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.s390x",
          "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.x86_64",
          "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.aarch64",
          "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.i686",
          "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.ppc64le",
          "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.s390x",
          "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.x86_64",
          "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.aarch64",
          "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.s390x",
          "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.src",
          "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.x86_64",
          "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.aarch64",
          "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.i686",
          "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.s390x",
          "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.x86_64",
          "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.aarch64",
          "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.i686",
          "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.s390x",
          "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.x86_64",
          "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.aarch64",
          "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.i686",
          "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.s390x",
          "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.x86_64",
          "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.aarch64",
          "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.i686",
          "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.s390x",
          "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.x86_64",
          "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.aarch64",
          "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.i686",
          "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.s390x",
          "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.x86_64",
          "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.aarch64",
          "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.i686",
          "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.s390x",
          "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-5222"
        },
        {
          "category": "external",
          "summary": "RHBZ#2368600",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368600"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-5222",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5222",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5222"
        }
      ],
      "release_date": "2024-11-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-31T04:59:19+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.src",
            "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.src",
            "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12332"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.src",
            "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.src",
            "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.src",
            "AppStream-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.x86_64",
            "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.aarch64",
            "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.i686",
            "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.ppc64le",
            "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.s390x",
            "AppStream-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.src",
            "BaseOS-9.4.0.Z.EUS:icu-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:icu-debuginfo-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:icu-debugsource-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:libicu-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:libicu-debuginfo-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-0:67.1-10.el9_4.x86_64",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.aarch64",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.i686",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.s390x",
            "BaseOS-9.4.0.Z.EUS:libicu-devel-debuginfo-0:67.1-10.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "icu: Stack buffer overflow in the SRBRoot::addTag function"
    }
  ]
}
  rhsa-2025:12331
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for icu is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The International Components for Unicode (ICU) library provides robust and full-featured Unicode services.\n\nSecurity Fix(es):\n\n* icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2025:12331",
        "url": "https://access.redhat.com/errata/RHSA-2025:12331"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2368600",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368600"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12331.json"
      }
    ],
    "title": "Red Hat Security Advisory: icu security update",
    "tracking": {
      "current_release_date": "2025-09-25T15:15:05+00:00",
      "generator": {
        "date": "2025-09-25T15:15:05+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2025:12331",
      "initial_release_date": "2025-07-31T04:35:04+00:00",
      "revision_history": [
        {
          "date": "2025-07-31T04:35:04+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-07-31T04:35:04+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T15:15:05+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
                  "product_id": "AppStream-9.2.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_e4s:9.2::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
                  "product_id": "BaseOS-9.2.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:9.2::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_2.src",
                "product": {
                  "name": "icu-0:67.1-10.el9_2.src",
                  "product_id": "icu-0:67.1-10.el9_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_2.aarch64",
                "product": {
                  "name": "libicu-0:67.1-10.el9_2.aarch64",
                  "product_id": "libicu-0:67.1-10.el9_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_2.aarch64",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_2.aarch64",
                  "product_id": "icu-debugsource-0:67.1-10.el9_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_2.aarch64",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_2.aarch64",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_2.aarch64",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_2.aarch64",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.aarch64",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.aarch64",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_2.aarch64",
                "product": {
                  "name": "icu-0:67.1-10.el9_2.aarch64",
                  "product_id": "icu-0:67.1-10.el9_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_2.aarch64",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_2.aarch64",
                  "product_id": "libicu-devel-0:67.1-10.el9_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_2?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_2.ppc64le",
                "product": {
                  "name": "libicu-0:67.1-10.el9_2.ppc64le",
                  "product_id": "libicu-0:67.1-10.el9_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_2.ppc64le",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_2.ppc64le",
                  "product_id": "icu-debugsource-0:67.1-10.el9_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_2.ppc64le",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_2.ppc64le",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_2.ppc64le",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_2.ppc64le",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.ppc64le",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.ppc64le",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_2.ppc64le",
                "product": {
                  "name": "icu-0:67.1-10.el9_2.ppc64le",
                  "product_id": "icu-0:67.1-10.el9_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_2.ppc64le",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_2.ppc64le",
                  "product_id": "libicu-devel-0:67.1-10.el9_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_2.i686",
                "product": {
                  "name": "libicu-0:67.1-10.el9_2.i686",
                  "product_id": "libicu-0:67.1-10.el9_2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_2.i686",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_2.i686",
                  "product_id": "icu-debugsource-0:67.1-10.el9_2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_2.i686",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_2.i686",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_2.i686",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_2.i686",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.i686",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.i686",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_2.i686",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_2.i686",
                  "product_id": "libicu-devel-0:67.1-10.el9_2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_2.x86_64",
                "product": {
                  "name": "libicu-0:67.1-10.el9_2.x86_64",
                  "product_id": "libicu-0:67.1-10.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_2.x86_64",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_2.x86_64",
                  "product_id": "icu-debugsource-0:67.1-10.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_2.x86_64",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_2.x86_64",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_2.x86_64",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_2.x86_64",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.x86_64",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.x86_64",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_2.x86_64",
                "product": {
                  "name": "icu-0:67.1-10.el9_2.x86_64",
                  "product_id": "icu-0:67.1-10.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_2.x86_64",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_2.x86_64",
                  "product_id": "libicu-devel-0:67.1-10.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_2.s390x",
                "product": {
                  "name": "libicu-0:67.1-10.el9_2.s390x",
                  "product_id": "libicu-0:67.1-10.el9_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_2.s390x",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_2.s390x",
                  "product_id": "icu-debugsource-0:67.1-10.el9_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_2.s390x",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_2.s390x",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_2.s390x",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_2.s390x",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.s390x",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.s390x",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_2.s390x",
                "product": {
                  "name": "icu-0:67.1-10.el9_2.s390x",
                  "product_id": "icu-0:67.1-10.el9_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_2.s390x",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_2.s390x",
                  "product_id": "libicu-devel-0:67.1-10.el9_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_2?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.aarch64"
        },
        "product_reference": "icu-0:67.1-10.el9_2.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.ppc64le"
        },
        "product_reference": "icu-0:67.1-10.el9_2.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.s390x"
        },
        "product_reference": "icu-0:67.1-10.el9_2.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.src"
        },
        "product_reference": "icu-0:67.1-10.el9_2.src",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.x86_64"
        },
        "product_reference": "icu-0:67.1-10.el9_2.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.aarch64"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_2.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.i686"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_2.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.ppc64le"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_2.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.s390x"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_2.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.x86_64"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_2.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.aarch64"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_2.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.i686"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_2.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.ppc64le"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_2.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.s390x"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_2.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.x86_64"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_2.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.aarch64"
        },
        "product_reference": "libicu-0:67.1-10.el9_2.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.i686"
        },
        "product_reference": "libicu-0:67.1-10.el9_2.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.ppc64le"
        },
        "product_reference": "libicu-0:67.1-10.el9_2.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.s390x"
        },
        "product_reference": "libicu-0:67.1-10.el9_2.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.x86_64"
        },
        "product_reference": "libicu-0:67.1-10.el9_2.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.aarch64"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_2.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.i686"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_2.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.ppc64le"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_2.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.s390x"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_2.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.x86_64"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_2.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.aarch64"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_2.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.i686"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_2.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.ppc64le"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_2.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.s390x"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_2.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.x86_64"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_2.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.aarch64"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_2.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.i686"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_2.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.ppc64le"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_2.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.s390x"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_2.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.x86_64"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_2.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.aarch64"
        },
        "product_reference": "icu-0:67.1-10.el9_2.aarch64",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.ppc64le"
        },
        "product_reference": "icu-0:67.1-10.el9_2.ppc64le",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.s390x"
        },
        "product_reference": "icu-0:67.1-10.el9_2.s390x",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.src"
        },
        "product_reference": "icu-0:67.1-10.el9_2.src",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.x86_64"
        },
        "product_reference": "icu-0:67.1-10.el9_2.x86_64",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.aarch64"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_2.aarch64",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.i686"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_2.i686",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.ppc64le"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_2.ppc64le",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.s390x"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_2.s390x",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.x86_64"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_2.x86_64",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.aarch64"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_2.aarch64",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.i686"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_2.i686",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.ppc64le"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_2.ppc64le",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.s390x"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_2.s390x",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.x86_64"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_2.x86_64",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.aarch64"
        },
        "product_reference": "libicu-0:67.1-10.el9_2.aarch64",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.i686"
        },
        "product_reference": "libicu-0:67.1-10.el9_2.i686",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.ppc64le"
        },
        "product_reference": "libicu-0:67.1-10.el9_2.ppc64le",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.s390x"
        },
        "product_reference": "libicu-0:67.1-10.el9_2.s390x",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.x86_64"
        },
        "product_reference": "libicu-0:67.1-10.el9_2.x86_64",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.aarch64"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_2.aarch64",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.i686"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_2.i686",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.ppc64le"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_2.ppc64le",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.s390x"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_2.s390x",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.x86_64"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_2.x86_64",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.aarch64"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_2.aarch64",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.i686"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_2.i686",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.ppc64le"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_2.ppc64le",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.s390x"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_2.s390x",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.x86_64"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_2.x86_64",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.aarch64"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_2.aarch64",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.i686"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_2.i686",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.ppc64le"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_2.ppc64le",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.s390x"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_2.s390x",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
          "product_id": "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.x86_64"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_2.x86_64",
        "relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-5222",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2025-05-26T13:39:54.361000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2368600"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the \u0027subtag\u0027 struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "icu: Stack buffer overflow in the SRBRoot::addTag function",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat follows best practice and federal requirements for least privilege, allowing only specific processes to be run with isolated accounts specific to team and federal platforms that have limited privileges that are only used for a single task. The environment leverages file integrity checks and malicious code protections, such as IPS/IDS and antimalware solutions, to help detect and prevent malicious code that attempts to exploit buffer overflow vulnerabilities. Robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.aarch64",
          "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.ppc64le",
          "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.s390x",
          "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.src",
          "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.x86_64",
          "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.aarch64",
          "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.i686",
          "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.ppc64le",
          "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.s390x",
          "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.x86_64",
          "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.aarch64",
          "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.i686",
          "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.ppc64le",
          "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.s390x",
          "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.x86_64",
          "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.aarch64",
          "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.i686",
          "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.ppc64le",
          "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.s390x",
          "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.x86_64",
          "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.aarch64",
          "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.i686",
          "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.ppc64le",
          "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.s390x",
          "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.x86_64",
          "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.aarch64",
          "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.i686",
          "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.ppc64le",
          "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.s390x",
          "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.x86_64",
          "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.aarch64",
          "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.i686",
          "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.ppc64le",
          "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.s390x",
          "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.x86_64",
          "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.aarch64",
          "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.ppc64le",
          "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.s390x",
          "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.src",
          "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.x86_64",
          "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.aarch64",
          "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.i686",
          "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.ppc64le",
          "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.s390x",
          "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.x86_64",
          "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.aarch64",
          "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.i686",
          "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.ppc64le",
          "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.s390x",
          "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.x86_64",
          "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.aarch64",
          "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.i686",
          "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.ppc64le",
          "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.s390x",
          "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.x86_64",
          "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.aarch64",
          "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.i686",
          "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.ppc64le",
          "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.s390x",
          "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.x86_64",
          "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.aarch64",
          "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.i686",
          "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.ppc64le",
          "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.s390x",
          "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.x86_64",
          "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.aarch64",
          "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.i686",
          "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.ppc64le",
          "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.s390x",
          "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-5222"
        },
        {
          "category": "external",
          "summary": "RHBZ#2368600",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368600"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-5222",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5222",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5222"
        }
      ],
      "release_date": "2024-11-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-31T04:35:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.src",
            "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.src",
            "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12331"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.src",
            "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.src",
            "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.src",
            "AppStream-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.x86_64",
            "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.aarch64",
            "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.i686",
            "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.ppc64le",
            "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.s390x",
            "AppStream-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.src",
            "BaseOS-9.2.0.Z.E4S:icu-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:icu-debugsource-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:libicu-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-0:67.1-10.el9_2.x86_64",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.aarch64",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.i686",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.ppc64le",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.s390x",
            "BaseOS-9.2.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "icu: Stack buffer overflow in the SRBRoot::addTag function"
    }
  ]
}
  rhsa-2025:11888
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for icu is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The International Components for Unicode (ICU) library provides robust and full-featured Unicode services.\n\nSecurity Fix(es):\n\n* icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2025:11888",
        "url": "https://access.redhat.com/errata/RHSA-2025:11888"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2368600",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368600"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11888.json"
      }
    ],
    "title": "Red Hat Security Advisory: icu security update",
    "tracking": {
      "current_release_date": "2025-09-25T15:14:29+00:00",
      "generator": {
        "date": "2025-09-25T15:14:29+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2025:11888",
      "initial_release_date": "2025-07-28T11:26:51+00:00",
      "revision_history": [
        {
          "date": "2025-07-28T11:26:51+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-07-28T11:26:51+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T15:14:29+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 10)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 10)",
                  "product_id": "AppStream-10.0.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:10.0"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 10)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 10)",
                  "product_id": "BaseOS-10.0.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:10.0"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icu-0:74.2-5.el10_0.src",
                "product": {
                  "name": "icu-0:74.2-5.el10_0.src",
                  "product_id": "icu-0:74.2-5.el10_0.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@74.2-5.el10_0?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libicu-0:74.2-5.el10_0.aarch64",
                "product": {
                  "name": "libicu-0:74.2-5.el10_0.aarch64",
                  "product_id": "libicu-0:74.2-5.el10_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@74.2-5.el10_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:74.2-5.el10_0.aarch64",
                "product": {
                  "name": "icu-debugsource-0:74.2-5.el10_0.aarch64",
                  "product_id": "icu-debugsource-0:74.2-5.el10_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@74.2-5.el10_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:74.2-5.el10_0.aarch64",
                "product": {
                  "name": "icu-debuginfo-0:74.2-5.el10_0.aarch64",
                  "product_id": "icu-debuginfo-0:74.2-5.el10_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@74.2-5.el10_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:74.2-5.el10_0.aarch64",
                "product": {
                  "name": "libicu-debuginfo-0:74.2-5.el10_0.aarch64",
                  "product_id": "libicu-debuginfo-0:74.2-5.el10_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@74.2-5.el10_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:74.2-5.el10_0.aarch64",
                "product": {
                  "name": "libicu-devel-debuginfo-0:74.2-5.el10_0.aarch64",
                  "product_id": "libicu-devel-debuginfo-0:74.2-5.el10_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@74.2-5.el10_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-0:74.2-5.el10_0.aarch64",
                "product": {
                  "name": "icu-0:74.2-5.el10_0.aarch64",
                  "product_id": "icu-0:74.2-5.el10_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@74.2-5.el10_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:74.2-5.el10_0.aarch64",
                "product": {
                  "name": "libicu-devel-0:74.2-5.el10_0.aarch64",
                  "product_id": "libicu-devel-0:74.2-5.el10_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@74.2-5.el10_0?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libicu-0:74.2-5.el10_0.ppc64le",
                "product": {
                  "name": "libicu-0:74.2-5.el10_0.ppc64le",
                  "product_id": "libicu-0:74.2-5.el10_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@74.2-5.el10_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:74.2-5.el10_0.ppc64le",
                "product": {
                  "name": "icu-debugsource-0:74.2-5.el10_0.ppc64le",
                  "product_id": "icu-debugsource-0:74.2-5.el10_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@74.2-5.el10_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:74.2-5.el10_0.ppc64le",
                "product": {
                  "name": "icu-debuginfo-0:74.2-5.el10_0.ppc64le",
                  "product_id": "icu-debuginfo-0:74.2-5.el10_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@74.2-5.el10_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:74.2-5.el10_0.ppc64le",
                "product": {
                  "name": "libicu-debuginfo-0:74.2-5.el10_0.ppc64le",
                  "product_id": "libicu-debuginfo-0:74.2-5.el10_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@74.2-5.el10_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:74.2-5.el10_0.ppc64le",
                "product": {
                  "name": "libicu-devel-debuginfo-0:74.2-5.el10_0.ppc64le",
                  "product_id": "libicu-devel-debuginfo-0:74.2-5.el10_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@74.2-5.el10_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-0:74.2-5.el10_0.ppc64le",
                "product": {
                  "name": "icu-0:74.2-5.el10_0.ppc64le",
                  "product_id": "icu-0:74.2-5.el10_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@74.2-5.el10_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:74.2-5.el10_0.ppc64le",
                "product": {
                  "name": "libicu-devel-0:74.2-5.el10_0.ppc64le",
                  "product_id": "libicu-devel-0:74.2-5.el10_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@74.2-5.el10_0?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libicu-0:74.2-5.el10_0.x86_64",
                "product": {
                  "name": "libicu-0:74.2-5.el10_0.x86_64",
                  "product_id": "libicu-0:74.2-5.el10_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@74.2-5.el10_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:74.2-5.el10_0.x86_64",
                "product": {
                  "name": "icu-debugsource-0:74.2-5.el10_0.x86_64",
                  "product_id": "icu-debugsource-0:74.2-5.el10_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@74.2-5.el10_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:74.2-5.el10_0.x86_64",
                "product": {
                  "name": "icu-debuginfo-0:74.2-5.el10_0.x86_64",
                  "product_id": "icu-debuginfo-0:74.2-5.el10_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@74.2-5.el10_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:74.2-5.el10_0.x86_64",
                "product": {
                  "name": "libicu-debuginfo-0:74.2-5.el10_0.x86_64",
                  "product_id": "libicu-debuginfo-0:74.2-5.el10_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@74.2-5.el10_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:74.2-5.el10_0.x86_64",
                "product": {
                  "name": "libicu-devel-debuginfo-0:74.2-5.el10_0.x86_64",
                  "product_id": "libicu-devel-debuginfo-0:74.2-5.el10_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@74.2-5.el10_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-0:74.2-5.el10_0.x86_64",
                "product": {
                  "name": "icu-0:74.2-5.el10_0.x86_64",
                  "product_id": "icu-0:74.2-5.el10_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@74.2-5.el10_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:74.2-5.el10_0.x86_64",
                "product": {
                  "name": "libicu-devel-0:74.2-5.el10_0.x86_64",
                  "product_id": "libicu-devel-0:74.2-5.el10_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@74.2-5.el10_0?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libicu-0:74.2-5.el10_0.s390x",
                "product": {
                  "name": "libicu-0:74.2-5.el10_0.s390x",
                  "product_id": "libicu-0:74.2-5.el10_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@74.2-5.el10_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:74.2-5.el10_0.s390x",
                "product": {
                  "name": "icu-debugsource-0:74.2-5.el10_0.s390x",
                  "product_id": "icu-debugsource-0:74.2-5.el10_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@74.2-5.el10_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:74.2-5.el10_0.s390x",
                "product": {
                  "name": "icu-debuginfo-0:74.2-5.el10_0.s390x",
                  "product_id": "icu-debuginfo-0:74.2-5.el10_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@74.2-5.el10_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:74.2-5.el10_0.s390x",
                "product": {
                  "name": "libicu-debuginfo-0:74.2-5.el10_0.s390x",
                  "product_id": "libicu-debuginfo-0:74.2-5.el10_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@74.2-5.el10_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:74.2-5.el10_0.s390x",
                "product": {
                  "name": "libicu-devel-debuginfo-0:74.2-5.el10_0.s390x",
                  "product_id": "libicu-devel-debuginfo-0:74.2-5.el10_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@74.2-5.el10_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-0:74.2-5.el10_0.s390x",
                "product": {
                  "name": "icu-0:74.2-5.el10_0.s390x",
                  "product_id": "icu-0:74.2-5.el10_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@74.2-5.el10_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:74.2-5.el10_0.s390x",
                "product": {
                  "name": "libicu-devel-0:74.2-5.el10_0.s390x",
                  "product_id": "libicu-devel-0:74.2-5.el10_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@74.2-5.el10_0?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:74.2-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:icu-0:74.2-5.el10_0.aarch64"
        },
        "product_reference": "icu-0:74.2-5.el10_0.aarch64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:74.2-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:icu-0:74.2-5.el10_0.ppc64le"
        },
        "product_reference": "icu-0:74.2-5.el10_0.ppc64le",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:74.2-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:icu-0:74.2-5.el10_0.s390x"
        },
        "product_reference": "icu-0:74.2-5.el10_0.s390x",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:74.2-5.el10_0.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:icu-0:74.2-5.el10_0.src"
        },
        "product_reference": "icu-0:74.2-5.el10_0.src",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:74.2-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:icu-0:74.2-5.el10_0.x86_64"
        },
        "product_reference": "icu-0:74.2-5.el10_0.x86_64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:74.2-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.aarch64"
        },
        "product_reference": "icu-debuginfo-0:74.2-5.el10_0.aarch64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:74.2-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.ppc64le"
        },
        "product_reference": "icu-debuginfo-0:74.2-5.el10_0.ppc64le",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:74.2-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.s390x"
        },
        "product_reference": "icu-debuginfo-0:74.2-5.el10_0.s390x",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:74.2-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.x86_64"
        },
        "product_reference": "icu-debuginfo-0:74.2-5.el10_0.x86_64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:74.2-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.aarch64"
        },
        "product_reference": "icu-debugsource-0:74.2-5.el10_0.aarch64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:74.2-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.ppc64le"
        },
        "product_reference": "icu-debugsource-0:74.2-5.el10_0.ppc64le",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:74.2-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.s390x"
        },
        "product_reference": "icu-debugsource-0:74.2-5.el10_0.s390x",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:74.2-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.x86_64"
        },
        "product_reference": "icu-debugsource-0:74.2-5.el10_0.x86_64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:74.2-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.aarch64"
        },
        "product_reference": "libicu-0:74.2-5.el10_0.aarch64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:74.2-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.ppc64le"
        },
        "product_reference": "libicu-0:74.2-5.el10_0.ppc64le",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:74.2-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.s390x"
        },
        "product_reference": "libicu-0:74.2-5.el10_0.s390x",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:74.2-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.x86_64"
        },
        "product_reference": "libicu-0:74.2-5.el10_0.x86_64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:74.2-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.aarch64"
        },
        "product_reference": "libicu-debuginfo-0:74.2-5.el10_0.aarch64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:74.2-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.ppc64le"
        },
        "product_reference": "libicu-debuginfo-0:74.2-5.el10_0.ppc64le",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:74.2-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.s390x"
        },
        "product_reference": "libicu-debuginfo-0:74.2-5.el10_0.s390x",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:74.2-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.x86_64"
        },
        "product_reference": "libicu-debuginfo-0:74.2-5.el10_0.x86_64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:74.2-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.aarch64"
        },
        "product_reference": "libicu-devel-0:74.2-5.el10_0.aarch64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:74.2-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.ppc64le"
        },
        "product_reference": "libicu-devel-0:74.2-5.el10_0.ppc64le",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:74.2-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.s390x"
        },
        "product_reference": "libicu-devel-0:74.2-5.el10_0.s390x",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:74.2-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.x86_64"
        },
        "product_reference": "libicu-devel-0:74.2-5.el10_0.x86_64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:74.2-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.aarch64"
        },
        "product_reference": "libicu-devel-debuginfo-0:74.2-5.el10_0.aarch64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:74.2-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.ppc64le"
        },
        "product_reference": "libicu-devel-debuginfo-0:74.2-5.el10_0.ppc64le",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:74.2-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.s390x"
        },
        "product_reference": "libicu-devel-debuginfo-0:74.2-5.el10_0.s390x",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:74.2-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.x86_64"
        },
        "product_reference": "libicu-devel-debuginfo-0:74.2-5.el10_0.x86_64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:74.2-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.aarch64"
        },
        "product_reference": "icu-0:74.2-5.el10_0.aarch64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:74.2-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.ppc64le"
        },
        "product_reference": "icu-0:74.2-5.el10_0.ppc64le",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:74.2-5.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.s390x"
        },
        "product_reference": "icu-0:74.2-5.el10_0.s390x",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:74.2-5.el10_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.src"
        },
        "product_reference": "icu-0:74.2-5.el10_0.src",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:74.2-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.x86_64"
        },
        "product_reference": "icu-0:74.2-5.el10_0.x86_64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:74.2-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.aarch64"
        },
        "product_reference": "icu-debuginfo-0:74.2-5.el10_0.aarch64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:74.2-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.ppc64le"
        },
        "product_reference": "icu-debuginfo-0:74.2-5.el10_0.ppc64le",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:74.2-5.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.s390x"
        },
        "product_reference": "icu-debuginfo-0:74.2-5.el10_0.s390x",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:74.2-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.x86_64"
        },
        "product_reference": "icu-debuginfo-0:74.2-5.el10_0.x86_64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:74.2-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.aarch64"
        },
        "product_reference": "icu-debugsource-0:74.2-5.el10_0.aarch64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:74.2-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.ppc64le"
        },
        "product_reference": "icu-debugsource-0:74.2-5.el10_0.ppc64le",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:74.2-5.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.s390x"
        },
        "product_reference": "icu-debugsource-0:74.2-5.el10_0.s390x",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:74.2-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.x86_64"
        },
        "product_reference": "icu-debugsource-0:74.2-5.el10_0.x86_64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:74.2-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.aarch64"
        },
        "product_reference": "libicu-0:74.2-5.el10_0.aarch64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:74.2-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.ppc64le"
        },
        "product_reference": "libicu-0:74.2-5.el10_0.ppc64le",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:74.2-5.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.s390x"
        },
        "product_reference": "libicu-0:74.2-5.el10_0.s390x",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:74.2-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.x86_64"
        },
        "product_reference": "libicu-0:74.2-5.el10_0.x86_64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:74.2-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.aarch64"
        },
        "product_reference": "libicu-debuginfo-0:74.2-5.el10_0.aarch64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:74.2-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.ppc64le"
        },
        "product_reference": "libicu-debuginfo-0:74.2-5.el10_0.ppc64le",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:74.2-5.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.s390x"
        },
        "product_reference": "libicu-debuginfo-0:74.2-5.el10_0.s390x",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:74.2-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.x86_64"
        },
        "product_reference": "libicu-debuginfo-0:74.2-5.el10_0.x86_64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:74.2-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.aarch64"
        },
        "product_reference": "libicu-devel-0:74.2-5.el10_0.aarch64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:74.2-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.ppc64le"
        },
        "product_reference": "libicu-devel-0:74.2-5.el10_0.ppc64le",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:74.2-5.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.s390x"
        },
        "product_reference": "libicu-devel-0:74.2-5.el10_0.s390x",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:74.2-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.x86_64"
        },
        "product_reference": "libicu-devel-0:74.2-5.el10_0.x86_64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:74.2-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.aarch64"
        },
        "product_reference": "libicu-devel-debuginfo-0:74.2-5.el10_0.aarch64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:74.2-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.ppc64le"
        },
        "product_reference": "libicu-devel-debuginfo-0:74.2-5.el10_0.ppc64le",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:74.2-5.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.s390x"
        },
        "product_reference": "libicu-devel-debuginfo-0:74.2-5.el10_0.s390x",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:74.2-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.x86_64"
        },
        "product_reference": "libicu-devel-debuginfo-0:74.2-5.el10_0.x86_64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-5222",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2025-05-26T13:39:54.361000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2368600"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the \u0027subtag\u0027 struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "icu: Stack buffer overflow in the SRBRoot::addTag function",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat follows best practice and federal requirements for least privilege, allowing only specific processes to be run with isolated accounts specific to team and federal platforms that have limited privileges that are only used for a single task. The environment leverages file integrity checks and malicious code protections, such as IPS/IDS and antimalware solutions, to help detect and prevent malicious code that attempts to exploit buffer overflow vulnerabilities. Robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-10.0.Z:icu-0:74.2-5.el10_0.aarch64",
          "AppStream-10.0.Z:icu-0:74.2-5.el10_0.ppc64le",
          "AppStream-10.0.Z:icu-0:74.2-5.el10_0.s390x",
          "AppStream-10.0.Z:icu-0:74.2-5.el10_0.src",
          "AppStream-10.0.Z:icu-0:74.2-5.el10_0.x86_64",
          "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.aarch64",
          "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.ppc64le",
          "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.s390x",
          "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.x86_64",
          "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.aarch64",
          "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.ppc64le",
          "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.s390x",
          "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.x86_64",
          "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.aarch64",
          "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.ppc64le",
          "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.s390x",
          "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.x86_64",
          "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.aarch64",
          "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.ppc64le",
          "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.s390x",
          "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.x86_64",
          "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.aarch64",
          "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.ppc64le",
          "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.s390x",
          "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.x86_64",
          "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.aarch64",
          "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.ppc64le",
          "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.s390x",
          "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.x86_64",
          "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.aarch64",
          "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.ppc64le",
          "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.s390x",
          "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.src",
          "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.x86_64",
          "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.aarch64",
          "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.ppc64le",
          "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.s390x",
          "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.x86_64",
          "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.aarch64",
          "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.ppc64le",
          "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.s390x",
          "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.x86_64",
          "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.aarch64",
          "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.ppc64le",
          "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.s390x",
          "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.x86_64",
          "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.aarch64",
          "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.ppc64le",
          "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.s390x",
          "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.x86_64",
          "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.aarch64",
          "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.ppc64le",
          "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.s390x",
          "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.x86_64",
          "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.aarch64",
          "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.ppc64le",
          "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.s390x",
          "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-5222"
        },
        {
          "category": "external",
          "summary": "RHBZ#2368600",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368600"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-5222",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5222",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5222"
        }
      ],
      "release_date": "2024-11-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-28T11:26:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-10.0.Z:icu-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:icu-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:icu-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:icu-0:74.2-5.el10_0.src",
            "AppStream-10.0.Z:icu-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.src",
            "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:11888"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-10.0.Z:icu-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:icu-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:icu-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:icu-0:74.2-5.el10_0.src",
            "AppStream-10.0.Z:icu-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.src",
            "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-10.0.Z:icu-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:icu-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:icu-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:icu-0:74.2-5.el10_0.src",
            "AppStream-10.0.Z:icu-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:icu-debugsource-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:libicu-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:libicu-devel-0:74.2-5.el10_0.x86_64",
            "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.aarch64",
            "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.ppc64le",
            "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.s390x",
            "AppStream-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.src",
            "BaseOS-10.0.Z:icu-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:icu-debuginfo-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:icu-debugsource-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:libicu-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:libicu-debuginfo-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:libicu-devel-0:74.2-5.el10_0.x86_64",
            "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.aarch64",
            "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.ppc64le",
            "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.s390x",
            "BaseOS-10.0.Z:libicu-devel-debuginfo-0:74.2-5.el10_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "icu: Stack buffer overflow in the SRBRoot::addTag function"
    }
  ]
}
  rhsa-2025:12333
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for icu is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The International Components for Unicode (ICU) library provides robust and full-featured Unicode services.\n\nSecurity Fix(es):\n\n* icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2025:12333",
        "url": "https://access.redhat.com/errata/RHSA-2025:12333"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2368600",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368600"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12333.json"
      }
    ],
    "title": "Red Hat Security Advisory: icu security update",
    "tracking": {
      "current_release_date": "2025-09-25T15:15:07+00:00",
      "generator": {
        "date": "2025-09-25T15:15:07+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2025:12333",
      "initial_release_date": "2025-07-31T04:52:34+00:00",
      "revision_history": [
        {
          "date": "2025-07-31T04:52:34+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-07-31T04:52:34+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T15:15:07+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
                  "product_id": "AppStream-9.0.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
                  "product_id": "BaseOS-9.0.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:9.0::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_0.src",
                "product": {
                  "name": "icu-0:67.1-10.el9_0.src",
                  "product_id": "icu-0:67.1-10.el9_0.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_0?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_0.aarch64",
                "product": {
                  "name": "libicu-0:67.1-10.el9_0.aarch64",
                  "product_id": "libicu-0:67.1-10.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_0.aarch64",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_0.aarch64",
                  "product_id": "icu-debugsource-0:67.1-10.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_0.aarch64",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_0.aarch64",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_0.aarch64",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_0.aarch64",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.aarch64",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.aarch64",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_0.aarch64",
                "product": {
                  "name": "icu-0:67.1-10.el9_0.aarch64",
                  "product_id": "icu-0:67.1-10.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_0.aarch64",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_0.aarch64",
                  "product_id": "libicu-devel-0:67.1-10.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_0?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_0.ppc64le",
                "product": {
                  "name": "libicu-0:67.1-10.el9_0.ppc64le",
                  "product_id": "libicu-0:67.1-10.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_0.ppc64le",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_0.ppc64le",
                  "product_id": "icu-debugsource-0:67.1-10.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_0.ppc64le",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_0.ppc64le",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_0.ppc64le",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_0.ppc64le",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.ppc64le",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.ppc64le",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_0.ppc64le",
                "product": {
                  "name": "icu-0:67.1-10.el9_0.ppc64le",
                  "product_id": "icu-0:67.1-10.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_0.ppc64le",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_0.ppc64le",
                  "product_id": "libicu-devel-0:67.1-10.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_0?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_0.i686",
                "product": {
                  "name": "libicu-0:67.1-10.el9_0.i686",
                  "product_id": "libicu-0:67.1-10.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_0?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_0.i686",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_0.i686",
                  "product_id": "icu-debugsource-0:67.1-10.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_0?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_0.i686",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_0.i686",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_0?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_0.i686",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_0.i686",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_0?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.i686",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.i686",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_0?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_0.i686",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_0.i686",
                  "product_id": "libicu-devel-0:67.1-10.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_0?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_0.x86_64",
                "product": {
                  "name": "libicu-0:67.1-10.el9_0.x86_64",
                  "product_id": "libicu-0:67.1-10.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_0.x86_64",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_0.x86_64",
                  "product_id": "icu-debugsource-0:67.1-10.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_0.x86_64",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_0.x86_64",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_0.x86_64",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_0.x86_64",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.x86_64",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.x86_64",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_0.x86_64",
                "product": {
                  "name": "icu-0:67.1-10.el9_0.x86_64",
                  "product_id": "icu-0:67.1-10.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_0.x86_64",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_0.x86_64",
                  "product_id": "libicu-devel-0:67.1-10.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_0?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libicu-0:67.1-10.el9_0.s390x",
                "product": {
                  "name": "libicu-0:67.1-10.el9_0.s390x",
                  "product_id": "libicu-0:67.1-10.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu@67.1-10.el9_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debugsource-0:67.1-10.el9_0.s390x",
                "product": {
                  "name": "icu-debugsource-0:67.1-10.el9_0.s390x",
                  "product_id": "icu-debugsource-0:67.1-10.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debugsource@67.1-10.el9_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-debuginfo-0:67.1-10.el9_0.s390x",
                "product": {
                  "name": "icu-debuginfo-0:67.1-10.el9_0.s390x",
                  "product_id": "icu-debuginfo-0:67.1-10.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu-debuginfo@67.1-10.el9_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-debuginfo-0:67.1-10.el9_0.s390x",
                "product": {
                  "name": "libicu-debuginfo-0:67.1-10.el9_0.s390x",
                  "product_id": "libicu-debuginfo-0:67.1-10.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-debuginfo@67.1-10.el9_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.s390x",
                "product": {
                  "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.s390x",
                  "product_id": "libicu-devel-debuginfo-0:67.1-10.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel-debuginfo@67.1-10.el9_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icu-0:67.1-10.el9_0.s390x",
                "product": {
                  "name": "icu-0:67.1-10.el9_0.s390x",
                  "product_id": "icu-0:67.1-10.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icu@67.1-10.el9_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libicu-devel-0:67.1-10.el9_0.s390x",
                "product": {
                  "name": "libicu-devel-0:67.1-10.el9_0.s390x",
                  "product_id": "libicu-devel-0:67.1-10.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libicu-devel@67.1-10.el9_0?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.aarch64"
        },
        "product_reference": "icu-0:67.1-10.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.ppc64le"
        },
        "product_reference": "icu-0:67.1-10.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.s390x"
        },
        "product_reference": "icu-0:67.1-10.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.src"
        },
        "product_reference": "icu-0:67.1-10.el9_0.src",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.x86_64"
        },
        "product_reference": "icu-0:67.1-10.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.aarch64"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.i686"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.ppc64le"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.s390x"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.x86_64"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.aarch64"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.i686"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.ppc64le"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.s390x"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.x86_64"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.aarch64"
        },
        "product_reference": "libicu-0:67.1-10.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.i686"
        },
        "product_reference": "libicu-0:67.1-10.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.ppc64le"
        },
        "product_reference": "libicu-0:67.1-10.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.s390x"
        },
        "product_reference": "libicu-0:67.1-10.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.x86_64"
        },
        "product_reference": "libicu-0:67.1-10.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.aarch64"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.i686"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.ppc64le"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.s390x"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.x86_64"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.aarch64"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.i686"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.ppc64le"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.s390x"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.x86_64"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.aarch64"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.i686"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.ppc64le"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.s390x"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.x86_64"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.aarch64"
        },
        "product_reference": "icu-0:67.1-10.el9_0.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.ppc64le"
        },
        "product_reference": "icu-0:67.1-10.el9_0.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.s390x"
        },
        "product_reference": "icu-0:67.1-10.el9_0.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_0.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.src"
        },
        "product_reference": "icu-0:67.1-10.el9_0.src",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-0:67.1-10.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.x86_64"
        },
        "product_reference": "icu-0:67.1-10.el9_0.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.aarch64"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_0.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_0.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.i686"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_0.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.ppc64le"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_0.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.s390x"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_0.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debuginfo-0:67.1-10.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.x86_64"
        },
        "product_reference": "icu-debuginfo-0:67.1-10.el9_0.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.aarch64"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_0.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_0.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.i686"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_0.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.ppc64le"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_0.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.s390x"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_0.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icu-debugsource-0:67.1-10.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.x86_64"
        },
        "product_reference": "icu-debugsource-0:67.1-10.el9_0.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.aarch64"
        },
        "product_reference": "libicu-0:67.1-10.el9_0.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_0.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.i686"
        },
        "product_reference": "libicu-0:67.1-10.el9_0.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.ppc64le"
        },
        "product_reference": "libicu-0:67.1-10.el9_0.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.s390x"
        },
        "product_reference": "libicu-0:67.1-10.el9_0.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-0:67.1-10.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.x86_64"
        },
        "product_reference": "libicu-0:67.1-10.el9_0.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.aarch64"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_0.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_0.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.i686"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_0.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.ppc64le"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_0.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.s390x"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_0.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-debuginfo-0:67.1-10.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.x86_64"
        },
        "product_reference": "libicu-debuginfo-0:67.1-10.el9_0.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.aarch64"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_0.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_0.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.i686"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_0.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.ppc64le"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_0.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.s390x"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_0.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-0:67.1-10.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.x86_64"
        },
        "product_reference": "libicu-devel-0:67.1-10.el9_0.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.aarch64"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_0.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.i686"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_0.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.ppc64le"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_0.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.s390x"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_0.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-devel-debuginfo-0:67.1-10.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.x86_64"
        },
        "product_reference": "libicu-devel-debuginfo-0:67.1-10.el9_0.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-5222",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2025-05-26T13:39:54.361000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2368600"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the \u0027subtag\u0027 struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "icu: Stack buffer overflow in the SRBRoot::addTag function",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat follows best practice and federal requirements for least privilege, allowing only specific processes to be run with isolated accounts specific to team and federal platforms that have limited privileges that are only used for a single task. The environment leverages file integrity checks and malicious code protections, such as IPS/IDS and antimalware solutions, to help detect and prevent malicious code that attempts to exploit buffer overflow vulnerabilities. Robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.src",
          "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.x86_64",
          "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.aarch64",
          "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.ppc64le",
          "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.s390x",
          "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.src",
          "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.x86_64",
          "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.aarch64",
          "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.i686",
          "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.ppc64le",
          "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.s390x",
          "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.x86_64",
          "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.aarch64",
          "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.i686",
          "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.ppc64le",
          "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.s390x",
          "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.x86_64",
          "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.aarch64",
          "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.i686",
          "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.ppc64le",
          "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.s390x",
          "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.x86_64",
          "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.aarch64",
          "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.i686",
          "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.ppc64le",
          "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.s390x",
          "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.x86_64",
          "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.aarch64",
          "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.i686",
          "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.ppc64le",
          "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.s390x",
          "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.x86_64",
          "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.aarch64",
          "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.i686",
          "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.ppc64le",
          "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.s390x",
          "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-5222"
        },
        {
          "category": "external",
          "summary": "RHBZ#2368600",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368600"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-5222",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5222",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5222"
        }
      ],
      "release_date": "2024-11-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-31T04:52:34+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.src",
            "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.src",
            "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12333"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.src",
            "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.src",
            "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.src",
            "AppStream-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.src",
            "BaseOS-9.0.0.Z.E4S:icu-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:icu-debuginfo-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:icu-debugsource-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:libicu-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:libicu-debuginfo-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-0:67.1-10.el9_0.x86_64",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.aarch64",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.i686",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.ppc64le",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.s390x",
            "BaseOS-9.0.0.Z.E4S:libicu-devel-debuginfo-0:67.1-10.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "icu: Stack buffer overflow in the SRBRoot::addTag function"
    }
  ]
}
  msrc_cve-2025-5222
Vulnerability from csaf_microsoft
Notes
{
  "document": {
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2025-5222 Icu: stack buffer overflow in the srbroot::addtag function - VEX",
        "url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-5222.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "Icu: stack buffer overflow in the srbroot::addtag function",
    "tracking": {
      "current_release_date": "2025-08-14T00:00:00.000Z",
      "generator": {
        "date": "2025-10-20T03:18:58.603Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2025-5222",
      "initial_release_date": "2025-05-02T00:00:00.000Z",
      "revision_history": [
        {
          "date": "2025-08-14T00:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "2.0",
                "product": {
                  "name": "CBL Mariner 2.0",
                  "product_id": "17086"
                }
              },
              {
                "category": "product_version",
                "name": "3.0",
                "product": {
                  "name": "Azure Linux 3.0",
                  "product_id": "17084"
                }
              }
            ],
            "category": "product_name",
            "name": "Azure Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 icu 68.2.0.9-2",
                "product": {
                  "name": "\u003ccbl2 icu 68.2.0.9-2",
                  "product_id": "3"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 icu 68.2.0.9-2",
                "product": {
                  "name": "cbl2 icu 68.2.0.9-2",
                  "product_id": "19571"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 icu 72.1.0.3-2",
                "product": {
                  "name": "\u003cazl3 icu 72.1.0.3-2",
                  "product_id": "1"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 icu 72.1.0.3-2",
                "product": {
                  "name": "azl3 icu 72.1.0.3-2",
                  "product_id": "20165"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 icu 68.2.0.9-1",
                "product": {
                  "name": "\u003ccbl2 icu 68.2.0.9-1",
                  "product_id": "2"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 icu 68.2.0.9-1",
                "product": {
                  "name": "cbl2 icu 68.2.0.9-1",
                  "product_id": "20162"
                }
              }
            ],
            "category": "product_name",
            "name": "icu"
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 icu 68.2.0.9-2 as a component of CBL Mariner 2.0",
          "product_id": "17086-3"
        },
        "product_reference": "3",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 icu 68.2.0.9-2 as a component of CBL Mariner 2.0",
          "product_id": "19571-17086"
        },
        "product_reference": "19571",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 icu 72.1.0.3-2 as a component of Azure Linux 3.0",
          "product_id": "17084-1"
        },
        "product_reference": "1",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 icu 72.1.0.3-2 as a component of Azure Linux 3.0",
          "product_id": "20165-17084"
        },
        "product_reference": "20165",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 icu 68.2.0.9-1 as a component of CBL Mariner 2.0",
          "product_id": "17086-2"
        },
        "product_reference": "2",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 icu 68.2.0.9-1 as a component of CBL Mariner 2.0",
          "product_id": "20162-17086"
        },
        "product_reference": "20162",
        "relates_to_product_reference": "17086"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-5222",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0026#39;Classic Buffer Overflow\u0026#39;)"
      },
      "notes": [
        {
          "category": "general",
          "text": "redhat",
          "title": "Assigning CNA"
        }
      ],
      "product_status": {
        "fixed": [
          "19571-17086",
          "20165-17084",
          "20162-17086"
        ],
        "known_affected": [
          "17086-3",
          "17084-1",
          "17086-2"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-5222 Icu: stack buffer overflow in the srbroot::addtag function - VEX",
          "url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-5222.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-14T00:00:00.000Z",
          "details": "68.2.0.9-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17086-3",
            "17086-2"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2025-08-14T00:00:00.000Z",
          "details": "72.1.0.3-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17084-1"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "environmentalsScore": 0.0,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 7.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "17086-3",
            "17084-1",
            "17086-2"
          ]
        }
      ],
      "title": "Icu: stack buffer overflow in the srbroot::addtag function"
    }
  ]
}
  ghsa-wv79-2fc4-v4hj
Vulnerability from github
A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the 'subtag' struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.
{
  "affected": [],
  "aliases": [
    "CVE-2025-5222"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-120"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2025-05-27T21:15:23Z",
    "severity": "HIGH"
  },
  "details": "A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the \u0027subtag\u0027 struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.",
  "id": "GHSA-wv79-2fc4-v4hj",
  "modified": "2025-07-31T06:30:31Z",
  "published": "2025-05-27T21:32:17Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5222"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2025:11888"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2025:12083"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2025:12331"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2025:12332"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2025:12333"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/security/cve/CVE-2025-5222"
    },
    {
      "type": "WEB",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368600"
    },
    {
      "type": "WEB",
      "url": "https://lists.debian.org/debian-lts-announce/2025/06/msg00015.html"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  fkie_cve-2025-5222
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:11888 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:12083 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:12331 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:12332 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:12333 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2025-5222 | Vendor Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2368600 | Issue Tracking | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2025/06/msg00015.html | Mailing List | 
| Vendor | Product | Version | |
|---|---|---|---|
| unicode | international_components_for_unicode | * | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:unicode:international_components_for_unicode:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA91C946-4A22-4445-9481-2FFFE43B78AB",
              "versionEndExcluding": "78.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the \u0027subtag\u0027 struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution."
    },
    {
      "lang": "es",
      "value": "Se detect\u00f3 un desbordamiento del b\u00fafer de pila en componentes internacionales para Unicode (ICU). Al ejecutar el binario genrb, la estructura \u0027subtag\u0027 se desbord\u00f3 en la funci\u00f3n SRBRoot::addTag. Este problema puede provocar corrupci\u00f3n de memoria y la ejecuci\u00f3n local de c\u00f3digo arbitrario."
    }
  ],
  "id": "CVE-2025-5222",
  "lastModified": "2025-08-08T14:55:36.747",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.0,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 5.9,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-05-27T21:15:23.030",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2025:11888"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2025:12083"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2025:12331"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2025:12332"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2025:12333"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2025-5222"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368600"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2025/06/msg00015.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    }
  ]
}
  wid-sec-w-2025-1406
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Die International Components for Unicode (ICU) sind C, C++ und Java Bibliotheken zur Auswertung regul\u00e4rer Ausdr\u00fccke bzw. zum Verarbeiten von Strings und Zeichen im Unicode Format.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in International Components for Unicode (icu) ausnutzen, um beliebigen Programmcode auszuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2025-1406 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1406.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2025-1406 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1406"
      },
      {
        "category": "external",
        "summary": "NIST Vulnerability Database vom 2025-06-25",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5222"
      },
      {
        "category": "external",
        "summary": "Red Hat Bugzilla vom 2025-06-25",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368600"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5951 vom 2025-06-27",
        "url": "https://lists.debian.org/debian-security-announce/2025/msg00115.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02216-1 vom 2025-07-03",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021746.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2-2025-2913 vom 2025-07-10",
        "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2913.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2-2025-2914 vom 2025-07-10",
        "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2914.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:11888 vom 2025-07-28",
        "url": "https://access.redhat.com/errata/RHSA-2025:11888"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-11888 vom 2025-07-29",
        "url": "http://linux.oracle.com/errata/ELSA-2025-11888.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-12083 vom 2025-07-30",
        "url": "https://linux.oracle.com/errata/ELSA-2025-12083.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12083 vom 2025-07-29",
        "url": "https://access.redhat.com/errata/RHSA-2025:12083"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12332 vom 2025-07-31",
        "url": "https://access.redhat.com/errata/RHSA-2025:12332"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12331 vom 2025-07-31",
        "url": "https://access.redhat.com/errata/RHSA-2025:12331"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12333 vom 2025-07-31",
        "url": "https://access.redhat.com/errata/RHSA-2025:12333"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7243787 vom 2025-09-02",
        "url": "https://www.ibm.com/support/pages/node/7243787"
      }
    ],
    "source_lang": "en-US",
    "title": "International Components for Unicode (icu): Schwachstelle erm\u00f6glicht Codeausf\u00fchrung",
    "tracking": {
      "current_release_date": "2025-09-02T22:00:00.000+00:00",
      "generator": {
        "date": "2025-09-03T07:16:38.052+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2025-1406",
      "initial_release_date": "2025-06-25T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2025-06-25T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2025-06-26T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2025-07-03T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-07-10T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-07-27T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-07-28T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-07-29T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
        },
        {
          "date": "2025-07-30T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-09-02T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von IBM aufgenommen"
        }
      ],
      "status": "final",
      "version": "9"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "IBM App Connect Enterprise",
            "product": {
              "name": "IBM App Connect Enterprise",
              "product_id": "T032495",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:app_connect_enterprise:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "76.0.1",
                "product": {
                  "name": "Open Source International Components for Unicode (icu) 76.0.1",
                  "product_id": "T044862",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:icu_project:international_components_for_unicode:76.0.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "International Components for Unicode (icu)"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-5222",
      "product_status": {
        "known_affected": [
          "T044862",
          "2951",
          "T002207",
          "67646",
          "398363",
          "T004914",
          "T032495"
        ]
      },
      "release_date": "2025-06-25T22:00:00.000+00:00",
      "title": "CVE-2025-5222"
    }
  ]
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.