Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-52999 (GCVE-0-2025-52999)
Vulnerability from cvelistv5
- CWE-121 - Stack-based Buffer Overflow
| Vendor | Product | Version | ||
|---|---|---|---|---|
| FasterXML | jackson-core |
Version: < 2.15.0 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-52999",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-25T18:04:07.206576Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-25T18:04:23.296Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "jackson-core",
"vendor": "FasterXML",
"versions": [
{
"status": "affected",
"version": "\u003c 2.15.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "jackson-core contains core low-level incremental (\"streaming\") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources."
}
],
"metrics": [
{
"cvssV4_0": {
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121: Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-25T17:02:57.428Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
},
{
"name": "https://github.com/FasterXML/jackson-core/pull/943",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/FasterXML/jackson-core/pull/943"
}
],
"source": {
"advisory": "GHSA-h46c-h94j-95f3",
"discovery": "UNKNOWN"
},
"title": "jackson-core Has Potential for StackoverflowError if user parses an input file that contains very deeply nested data"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-52999",
"datePublished": "2025-06-25T17:02:57.428Z",
"dateReserved": "2025-06-24T03:50:36.795Z",
"dateUpdated": "2025-06-25T18:04:23.296Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-52999\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-06-25T17:15:39.820\",\"lastModified\":\"2025-06-26T18:57:43.670\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"jackson-core contains core low-level incremental (\\\"streaming\\\") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources.\"},{\"lang\":\"es\",\"value\":\"jackson-core contiene las abstracciones principales del analizador incremental (\\\"streaming\\\") de bajo nivel y del generador utilizadas por Jackson Data Processor. En versiones anteriores a la 2.15.0, si un usuario analiza un archivo de entrada con datos profundamente anidados, Jackson pod\u00eda generar un error de Stackoverflow si la profundidad era excesiva. jackson-core 2.15.0 incluye un l\u00edmite configurable para la profundidad que Jackson recorrer\u00e1 en un documento de entrada, con una profundidad predeterminada de 1000. jackson-core generar\u00e1 una excepci\u00f3n StreamConstraintsException si se alcanza el l\u00edmite. jackson-databind tambi\u00e9n se beneficia de este cambio, ya que utiliza jackson-core para analizar las entradas JSON. Como soluci\u00f3n alternativa, se recomienda a los usuarios evitar analizar archivos de entrada de fuentes no confiables.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]}],\"references\":[{\"url\":\"https://github.com/FasterXML/jackson-core/pull/943\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3\",\"source\":\"security-advisories@github.com\"}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"title\": \"jackson-core Has Potential for StackoverflowError if user parses an input file that contains very deeply nested data\", \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-121\", \"lang\": \"en\", \"description\": \"CWE-121: Stack-based Buffer Overflow\", \"type\": \"CWE\"}]}], \"metrics\": [{\"cvssV4_0\": {\"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"baseScore\": 8.7, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N\", \"version\": \"4.0\"}}], \"references\": [{\"name\": \"https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3\", \"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3\"}, {\"name\": \"https://github.com/FasterXML/jackson-core/pull/943\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/FasterXML/jackson-core/pull/943\"}], \"affected\": [{\"vendor\": \"FasterXML\", \"product\": \"jackson-core\", \"versions\": [{\"version\": \"\u003c 2.15.0\", \"status\": \"affected\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-06-25T17:02:57.428Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"jackson-core contains core low-level incremental (\\\"streaming\\\") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources.\"}], \"source\": {\"advisory\": \"GHSA-h46c-h94j-95f3\", \"discovery\": \"UNKNOWN\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-52999\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-25T18:04:07.206576Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-25T18:04:19.172Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2025-52999\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"GitHub_M\", \"dateReserved\": \"2025-06-24T03:50:36.795Z\", \"datePublished\": \"2025-06-25T17:02:57.428Z\", \"dateUpdated\": \"2025-06-25T18:04:23.296Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
rhsa-2025:10098
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP \nTools 4.16. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not enforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10098",
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10098.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.16 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-11-11T16:21:29+00:00",
"generator": {
"date": "2025-11-11T16:21:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:10098",
"initial_release_date": "2025-07-01T14:34:48+00:00",
"revision_history": [
{
"date": "2025-07-01T14:34:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T14:34:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:21:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.16",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.16::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750857144-3.el9.src",
"product": {
"name": "jenkins-0:2.504.2.1750857144-3.el9.src",
"product_id": "jenkins-0:2.504.2.1750857144-3.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750857144-3.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src",
"product": {
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src",
"product_id": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.16.1750857315-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750857144-3.el9.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750857144-3.el9.noarch",
"product_id": "jenkins-0:2.504.2.1750857144-3.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750857144-3.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"product_id": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.16.1750857315-1.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750857144-3.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750857144-3.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750857144-3.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src"
},
"product_reference": "jenkins-0:2.504.2.1750857144-3.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
},
"product_reference": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.16"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:34:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:34:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:34:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:34:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:12283
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Core part of Jackson that defines Streaming API as well as basic shared abstractions.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12283",
"url": "https://access.redhat.com/errata/RHSA-2025:12283"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12283.json"
}
],
"title": "Red Hat Security Advisory: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security update",
"tracking": {
"current_release_date": "2025-11-07T20:55:50+00:00",
"generator": {
"date": "2025-11-07T20:55:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:12283",
"initial_release_date": "2025-07-30T09:49:42+00:00",
"revision_history": [
{
"date": "2025-07-30T09:49:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-30T09:49:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T20:55:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.el9_0.src",
"product": {
"name": "jackson-core-0:2.19.1-1.el9_0.src",
"product_id": "jackson-core-0:2.19.1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.el9_0.src",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.el9_0.src",
"product_id": "jackson-modules-base-0:2.19.1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.el9_0.src",
"product": {
"name": "jackson-databind-0:2.19.1-1.el9_0.src",
"product_id": "jackson-databind-0:2.19.1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.el9_0.src",
"product": {
"name": "jackson-annotations-0:2.19.1-1.el9_0.src",
"product_id": "jackson-annotations-0:2.19.1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-core@2.19.1-1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-json-provider@2.19.1-1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-providers@2.19.1-1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-module-jaxb-annotations@2.19.1-1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-databind@2.19.1-1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-annotations@2.19.1-1.el9_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_0.src"
},
"product_reference": "jackson-annotations-0:2.19.1-1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:jackson-core-0:2.19.1-1.el9_0.src"
},
"product_reference": "jackson-core-0:2.19.1-1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_0.src"
},
"product_reference": "jackson-databind-0:2.19.1-1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_0.src"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_0.src"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-core-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-core-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T09:49:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-core-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12283"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-core-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-core-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:14127
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the pki-deps:10.6 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:14127",
"url": "https://access.redhat.com/errata/RHSA-2025:14127"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14127.json"
}
],
"title": "Red Hat Security Advisory: pki-deps:10.6 security update",
"tracking": {
"current_release_date": "2025-11-07T20:55:52+00:00",
"generator": {
"date": "2025-11-07T20:55:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:14127",
"initial_release_date": "2025-08-20T04:16:28+00:00",
"revision_history": [
{
"date": "2025-08-20T04:16:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-20T04:16:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T20:55:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax-api@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-core@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-runtime@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-txw2@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-json-provider@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-module-jaxb-annotations@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-javadoc@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"product": {
"name": "pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch (pki-deps:10.6)",
"product_id": "pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-4.0-api@9.0.7-16.module%2Bel8.2.0%2B23390%2B7631bd3f.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.7-16.module%2Bel8.2.0%2B23390%2B7631bd3f.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch::pki-deps:10.6",
"product": {
"name": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch (pki-deps:10.6)",
"product_id": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-3.module%2Bel8.2.0%2B23401%2B65186842?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j-jdk14@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.7-16.module%2Bel8.2.0%2B23390%2B7631bd3f.2?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src::pki-deps:10.6",
"product": {
"name": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src (pki-deps:10.6)",
"product_id": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-3.module%2Bel8.2.0%2B23401%2B65186842?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-20T04:16:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:14127"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:10118
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP\nTools 4.12. Red Hat Product Security has rated this update as having a\nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10118",
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10118.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.12 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-11-11T16:21:30+00:00",
"generator": {
"date": "2025-11-11T16:21:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:10118",
"initial_release_date": "2025-07-01T16:36:58+00:00",
"revision_history": [
{
"date": "2025-07-01T16:36:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T16:36:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:21:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.12",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.12::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750932984-3.el8.src",
"product": {
"name": "jenkins-0:2.504.2.1750932984-3.el8.src",
"product_id": "jenkins-0:2.504.2.1750932984-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750932984-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.12.1750933270-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750932984-3.el8.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750932984-3.el8.noarch",
"product_id": "jenkins-0:2.504.2.1750932984-3.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750932984-3.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.12.1750933270-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750932984-3.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750932984-3.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750932984-3.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src"
},
"product_reference": "jenkins-0:2.504.2.1750932984-3.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:15847
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Dev Spaces 3.23.0 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Dev Spaces provides a cloud developer workspace server and a browser-based IDE built for teams and organizations. Dev Spaces runs in OpenShift and is well-suited for container-based development. The 3.23 release is based on Eclipse Che 7.107 and uses the DevWorkspace engine to provide support for workspaces based on devfile v2.1 and v2.2. Users still using the v1 standard should migrate as soon as possible. https://devfile.io/docs/2.2.0/migrating-to-devfile-v2 Dev Spaces supports OpenShift EUS releases v4.14 and higher. Users are expected to update to supported OpenShift releases in order to continue to get Dev Spaces updates. https://access.redhat.com/support/policy/updates/openshift#crw",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15847",
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_openshift_dev_spaces/3.23/html/administration_guide/installing-devspaces",
"url": "https://access.redhat.com/documentation/en-us/red_hat_openshift_dev_spaces/3.23/html/administration_guide/installing-devspaces"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-10005",
"url": "https://access.redhat.com/security/cve/CVE-2024-10005"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-10006",
"url": "https://access.redhat.com/security/cve/CVE-2024-10006"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-22189",
"url": "https://access.redhat.com/security/cve/CVE-2024-22189"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-24789",
"url": "https://access.redhat.com/security/cve/CVE-2024-24789"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-28869",
"url": "https://access.redhat.com/security/cve/CVE-2024-28869"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-39321",
"url": "https://access.redhat.com/security/cve/CVE-2024-39321"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-45338",
"url": "https://access.redhat.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-48385",
"url": "https://access.redhat.com/security/cve/CVE-2025-48385"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-48387",
"url": "https://access.redhat.com/security/cve/CVE-2025-48387"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-52999",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9287",
"url": "https://access.redhat.com/security/cve/CVE-2025-9287"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9288",
"url": "https://access.redhat.com/security/cve/CVE-2025-9288"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15847.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.23.0 Release.",
"tracking": {
"current_release_date": "2025-11-11T16:07:04+00:00",
"generator": {
"date": "2025-11-11T16:07:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:15847",
"initial_release_date": "2025-09-15T16:27:40+00:00",
"revision_history": [
{
"date": "2025-09-15T16:27:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-15T16:27:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:07:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product": {
"name": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_devspaces:3.23::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Dev Spaces (RHOSDS)"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3A2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757618807"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3Ad2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756506343"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757019057"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"product": {
"name": "registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"product_id": "registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/idea-rhel9@sha256%3Adf24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e?arch=amd64\u0026repository_url=registry.redhat.io/devspaces-tech-preview\u0026tag=3.23-1756504289"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3Aa69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756507311"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"product": {
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"product_id": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3Aac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8?arch=amd64\u0026repository_url=registry.redhat.io/devspaces-tech-preview\u0026tag=3.23-1757019334"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3Ad23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756509551"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3A6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757017659"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3A2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756828766"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"product_id": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-operator-bundle@sha256%3Aa48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757629825"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3A918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757367052"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756753588"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3A15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756504388"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3A65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757028609"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel9@sha256%3A42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757037884"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3A48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757618807"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3A934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756506343"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757019057"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3A8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756507311"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"product": {
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"product_id": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3Acd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85?arch=s390x\u0026repository_url=registry.redhat.io/devspaces-tech-preview\u0026tag=3.23-1757019334"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3Ae32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756509551"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3A1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757017659"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3A59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756828766"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3Af2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757367052"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756753588"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3A5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756504388"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3Aa4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757028609"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel9@sha256%3Ab60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757037884"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3A8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757618807"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3A7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756506343"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757019057"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3Aad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756507311"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"product_id": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3A0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces-tech-preview\u0026tag=3.23-1757019334"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3A13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756509551"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3Ae762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757017659"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3A38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756828766"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3A5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757367052"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3Afa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756753588"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3Aa152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756504388"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3Acc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757028609"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel9@sha256%3Aee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757037884"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3A32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757618807"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3A43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756506343"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757019057"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3Ac9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756507311"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"product": {
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"product_id": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3Ad0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d?arch=arm64\u0026repository_url=registry.redhat.io/devspaces-tech-preview\u0026tag=3.23-1757019334"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3A43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756509551"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3A15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757017659"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3Af5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756828766"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3Acc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757367052"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756753588"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3Af17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756504388"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3A53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757028609"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel9@sha256%3Aa86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757037884"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64"
},
"product_reference": "registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64"
},
"product_reference": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x"
},
"product_reference": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64"
},
"product_reference": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-10005",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2024-10-30T22:00:40.599537+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2322857"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in HashiCorp Consul. Due to a lack of path normalization, URL paths in L7 traffic intentions can be exploited to bypass permissions defined in the intentions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hashicorp/consul: consul: Consul L7 Intentions Vulnerable To URL Path Bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because the lack of path normalization in HashiCorp Consul allows attackers to exploit URL paths in L7 traffic intentions, bypassing defined permissions. This can compromise both confidentiality and integrity, enabling unauthorized access to sensitive data and resources, highlighting the need for immediate attention.\n\nThis CVE has been rated \"Low\" as RH does not use Consul/Consul Catalog as a provider for configuration discovery in Traefik Proxy. Even though the product is affected, RH products are not vulnerable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-10005"
},
{
"category": "external",
"summary": "RHBZ#2322857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322857"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-10005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-10005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10005"
},
{
"category": "external",
"summary": "https://discuss.hashicorp.com/t/hcsec-2024-22-consul-l7-intentions-vulnerable-to-url-path-bypass",
"url": "https://discuss.hashicorp.com/t/hcsec-2024-22-consul-l7-intentions-vulnerable-to-url-path-bypass"
}
],
"release_date": "2024-10-30T21:19:22.576000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "hashicorp/consul: consul: Consul L7 Intentions Vulnerable To URL Path Bypass"
},
{
"cve": "CVE-2024-10006",
"cwe": {
"id": "CWE-644",
"name": "Improper Neutralization of HTTP Headers for Scripting Syntax"
},
"discovery_date": "2024-10-30T22:00:44.245072+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2322858"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in HashiCorp Consul and Consul Enterprise. The server response does not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and can lead to reflected cross-site scripting (XSS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hashicorp/consul: consul: Consul L7 Intentions Vulnerable To Headers Bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because HashiCorp Consul fails to set a Content-Type HTTP header, allowing user inputs to be misinterpreted and potentially leading to reflected cross-site scripting (XSS). This can compromise both confidentiality and integrity, posing a risk to user data and application security, which requires prompt remediation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-10006"
},
{
"category": "external",
"summary": "RHBZ#2322858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322858"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-10006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10006"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-10006",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10006"
},
{
"category": "external",
"summary": "https://discuss.hashicorp.com/t/hcsec-2024-23-consul-l7-intentions-vulnerable-to-headers-bypass",
"url": "https://discuss.hashicorp.com/t/hcsec-2024-23-consul-l7-intentions-vulnerable-to-headers-bypass"
}
],
"release_date": "2024-10-30T21:20:37.011000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hashicorp/consul: consul: Consul L7 Intentions Vulnerable To Headers Bypass"
},
{
"cve": "CVE-2024-22189",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-04-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273513"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in quic-go. This issue may allow an attacker to trigger a denial of service by sending a large number of NEW_CONNECTION_ID frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a RETIRE_CONNECTION_ID frame, but the attacker can prevent the receiver from sending out the vast majority of these RETIRE_CONNECTION_ID frames by selectively acknowledging received packets and collapsing the peers congestion window and by manipulating the peer\u0027s RTT estimate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "quic-go: memory exhaustion attack against QUIC\u0027s connection ID mechanism",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-770: Allocation of Resources Without Limits or Throttling vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings required for operations, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect excessive resource usage caused by malicious activity or system misconfigurations. In the event of exploitation, process isolation ensures workloads operate in separate environments, preventing any single process from overconsuming CPU or memory and degrading system performance.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-22189"
},
{
"category": "external",
"summary": "RHBZ#2273513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273513"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-22189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22189"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22189",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22189"
},
{
"category": "external",
"summary": "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a",
"url": "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a"
},
{
"category": "external",
"summary": "https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478",
"url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478"
},
{
"category": "external",
"summary": "https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management",
"url": "https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management"
}
],
"release_date": "2024-04-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "quic-go: memory exhaustion attack against QUIC\u0027s connection ID mechanism"
},
{
"cve": "CVE-2024-24789",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-06-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2292668"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The ZIP implementation of the Go language archive/zip library behaves differently than the rest of the ZIP file format implementations. When handling ZIP files with a corrupted central directory record, the library skips over the invalid record and processes the next valid one. This flaw allows a malicious user to access hidden information or files inside maliciously crafted ZIP files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Incorrect handling of certain ZIP files",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-24789"
},
{
"category": "external",
"summary": "RHBZ#2292668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292668"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24789"
}
],
"release_date": "2024-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Incorrect handling of certain ZIP files"
},
{
"cve": "CVE-2024-28869",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"discovery_date": "2024-04-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2274987"
}
],
"notes": [
{
"category": "description",
"text": "An improper handling of exceptional conditions vulnerability was found in Traefik. In affected versions, sending a GET request to any Traefik endpoint with the \"Content-length\" request header results in an indefinite hang with the default configuration, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "traefik: denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-28869"
},
{
"category": "external",
"summary": "RHBZ#2274987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274987"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-28869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28869"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28869",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28869"
},
{
"category": "external",
"summary": "https://github.com/traefik/traefik/commit/240b83b77351dfd8cadb91c305b84e9d22e0f9c6",
"url": "https://github.com/traefik/traefik/commit/240b83b77351dfd8cadb91c305b84e9d22e0f9c6"
},
{
"category": "external",
"summary": "https://github.com/traefik/traefik/security/advisories/GHSA-4vwx-54mw-vqfw",
"url": "https://github.com/traefik/traefik/security/advisories/GHSA-4vwx-54mw-vqfw"
}
],
"release_date": "2024-04-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "traefik: denial of service"
},
{
"cve": "CVE-2024-39321",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"discovery_date": "2024-07-05T18:20:25+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2296009"
}
],
"notes": [
{
"category": "description",
"text": "An authorization bypass vulnerability was found in Traefik. This flaw allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "traefik: Bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability in Traefik that allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes, while notable, is categorized as moderate severity rather than important. This classification stems from the requirement for an attacker to leverage HTTP/3\u0027s early data feature and perform spoofed IP address manipulation to exploit the flaw. As a result, successful exploitation demands specific conditions, including network-level access and manipulation capabilities, which may not be trivial in many environments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-39321"
},
{
"category": "external",
"summary": "RHBZ#2296009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39321"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39321",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39321"
},
{
"category": "external",
"summary": "https://github.com/traefik/traefik/releases/tag/v2.11.6",
"url": "https://github.com/traefik/traefik/releases/tag/v2.11.6"
},
{
"category": "external",
"summary": "https://github.com/traefik/traefik/releases/tag/v3.0.4",
"url": "https://github.com/traefik/traefik/releases/tag/v3.0.4"
},
{
"category": "external",
"summary": "https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3",
"url": "https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3"
},
{
"category": "external",
"summary": "https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9",
"url": "https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9"
}
],
"release_date": "2024-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "traefik: Bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes"
},
{
"cve": "CVE-2024-45338",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-12-18T21:00:59.938173+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333122"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org/x/net/html. This flaw allows an attacker to craft input to the parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This issue can cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as an Important severity because an attacker can craft malicious input that causes the parsing functions to process data non-linearly, resulting in significant delays which leads to a denial of service by exhausting system resources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "RHBZ#2333122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338"
},
{
"category": "external",
"summary": "https://go.dev/cl/637536",
"url": "https://go.dev/cl/637536"
},
{
"category": "external",
"summary": "https://go.dev/issue/70906",
"url": "https://go.dev/issue/70906"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ",
"url": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3333",
"url": "https://pkg.go.dev/vuln/GO-2024-3333"
}
],
"release_date": "2024-12-18T20:38:22.660000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html"
},
{
"cve": "CVE-2025-9287",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-08-20T22:00:53.821394+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2389932"
}
],
"notes": [
{
"category": "description",
"text": "An improper input validation vulnerability was found in the cipher-base npm package. Missing input type checks in the polyfill of the Node.js `createHash` function result in invalid\u00a0value calculations,\u00a0hanging and\u00a0rewinding the\u00a0hash state, including\u00a0turning a tagged hash\u00a0into an untagged\u00a0hash, for malicious JSON-stringifyable\u00a0inputs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cipher-base: Cipher-base hash manipulation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9287"
},
{
"category": "external",
"summary": "RHBZ#2389932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2389932"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9287"
},
{
"category": "external",
"summary": "https://github.com/browserify/cipher-base/pull/23",
"url": "https://github.com/browserify/cipher-base/pull/23"
},
{
"category": "external",
"summary": "https://github.com/browserify/cipher-base/security/advisories/GHSA-cpq7-6gpm-g9rc",
"url": "https://github.com/browserify/cipher-base/security/advisories/GHSA-cpq7-6gpm-g9rc"
}
],
"release_date": "2025-08-20T21:43:56.548000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cipher-base: Cipher-base hash manipulation"
},
{
"cve": "CVE-2025-9288",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-08-20T23:00:56.263191+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2389980"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in sha.js, where the hashing implementation does not perform sufficient input type validation. The .update() function accepts arbitrary objects, including those with crafted length properties, which can alter the internal state machine of the hashing process. This flaw may result in unexpected behavior such as rewinding the hash state, producing inconsistent digest outputs, or entering invalid processing loops. The issue was introduced due to the reliance on JavaScript object coercion rules rather than enforcing strict buffer or string inputs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sha.js: Missing type checks leading to hash rewind and passing on crafted data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important rather then Critical because while the lack of input type checks in sha.js allows for hash state rewinding, crafted collisions, and potential denial of service, the vulnerability requires highly specific crafted input objects that are unlikely to occur in typical real-world usage, especially since most applications pass well-formed strings or buffers to hashing functions. Moreover, the cryptographic breakages described, such as nonce reuse leading to private key extraction, are indirect and depend on downstream libraries misusing sha.js for sensitive operations without additional validation layers. As a result, the flaw significantly undermines correctness and robustness of the hashing API, but its exploitability in common production systems is constrained, which could justify viewing it as an Important vulnerability rather than a Critical one.\n\n\nThe flaw requires applications to pass attacker-controlled, non-standard JavaScript objects into hash.update(). Most real-world Node.js applications and libraries already use Buffer, TypedArray, or String inputs, which are unaffected. Furthermore, Node\u2019s built-in crypto module, which is widely adopted, enforces stricter type-checking and is not impacted. As a result, the vulnerability mainly threatens projects that (a) directly depend on sha.js for cryptographically sensitive operations, and (b) hash untrusted input without type validation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9288"
},
{
"category": "external",
"summary": "RHBZ#2389980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2389980"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9288",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9288"
},
{
"category": "external",
"summary": "https://github.com/browserify/sha.js/pull/78",
"url": "https://github.com/browserify/sha.js/pull/78"
},
{
"category": "external",
"summary": "https://github.com/browserify/sha.js/security/advisories/GHSA-95m3-7q98-8xr5",
"url": "https://github.com/browserify/sha.js/security/advisories/GHSA-95m3-7q98-8xr5"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9287"
}
],
"release_date": "2025-08-20T21:59:44.728000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sha.js: Missing type checks leading to hash rewind and passing on crafted data"
},
{
"cve": "CVE-2025-48385",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2025-07-08T19:00:55.106787+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2378808"
}
],
"notes": [
{
"category": "description",
"text": "A bundled uri handling flaw was found in Git. When cloning a repository, Git knows to optionally fetch a bundle advertised by the remote server, which allows the server side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "git: Git arbitrary file writes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability marked as Important rather than a Moderate flaw because it enables protocol injection at the transport layer of Git\u0027s bundle-uri mechanism, allowing a remote server to manipulate how and where data is written on the client system during a clone operation. The lack of input sanitization on user-controlled values like the URI and target path means that malformed inputs containing spaces or newlines can break protocol framing, leading to arbitrary file writes. In scenarios such as CI pipelines, developer environments, or recursive clones with submodules, an attacker can exploit this to overwrite critical files or inject malicious content, potentially achieving remote code execution (RCE).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-48385"
},
{
"category": "external",
"summary": "RHBZ#2378808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378808"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-48385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-48385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48385"
},
{
"category": "external",
"summary": "https://github.com/git/git/security/advisories/GHSA-m98c-vgpc-9655",
"url": "https://github.com/git/git/security/advisories/GHSA-m98c-vgpc-9655"
}
],
"release_date": "2025-07-08T18:23:44.405000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "git: Git arbitrary file writes"
},
{
"cve": "CVE-2025-48387",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-06-02T20:00:45.526571+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2369875"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in tar-fs. This vulnerability allows files to be written outside the intended extraction directory via specially crafted tar archives. The issue arises from insufficient path validation during tarball extraction, potentially enabling path traversal attacks that can overwrite arbitrary files on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tar-fs: tar-fs has issue where extract can write outside the specified dir with a specific tarball",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in tar-fs is Important not a moderate flaw, primarily due to its ability to bypass directory confinement during tarball extraction. The core issue\u2014path traversal via crafted archive entries\u2014allows attackers to write files outside the intended extraction directory, potentially overwriting system files, configuration files, or injecting malicious scripts into sensitive locations. Unlike moderate flaws that may require specific conditions or user interaction to exploit, this vulnerability can be triggered automatically in server-side environments that extract user-supplied tar files (e.g., CI/CD systems, deployment tools, or file upload handlers). Its exploitation could lead to remote code execution, privilege escalation, or denial of service, depending on the context.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-48387"
},
{
"category": "external",
"summary": "RHBZ#2369875",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369875"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-48387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48387"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-48387",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48387"
},
{
"category": "external",
"summary": "https://github.com/mafintosh/tar-fs/commit/647447b572bc135c41035e82ca7b894f02b17f0f",
"url": "https://github.com/mafintosh/tar-fs/commit/647447b572bc135c41035e82ca7b894f02b17f0f"
},
{
"category": "external",
"summary": "https://github.com/mafintosh/tar-fs/security/advisories/GHSA-8cj5-5rvv-wf4v",
"url": "https://github.com/mafintosh/tar-fs/security/advisories/GHSA-8cj5-5rvv-wf4v"
}
],
"release_date": "2025-06-02T19:20:18.220000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "workaround",
"details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tar-fs: tar-fs has issue where extract can write outside the specified dir with a specific tarball"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:12280
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Core part of Jackson that defines Streaming API as well as basic shared abstractions.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12280",
"url": "https://access.redhat.com/errata/RHSA-2025:12280"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12280.json"
}
],
"title": "Red Hat Security Advisory: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security update",
"tracking": {
"current_release_date": "2025-11-07T20:55:48+00:00",
"generator": {
"date": "2025-11-07T20:55:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:12280",
"initial_release_date": "2025-07-30T09:55:57+00:00",
"revision_history": [
{
"date": "2025-07-30T09:55:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-30T09:55:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T20:55:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.el9_6.src",
"product": {
"name": "jackson-core-0:2.19.1-1.el9_6.src",
"product_id": "jackson-core-0:2.19.1-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.el9_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.el9_6.src",
"product": {
"name": "jackson-annotations-0:2.19.1-1.el9_6.src",
"product_id": "jackson-annotations-0:2.19.1-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.el9_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.el9_6.src",
"product": {
"name": "jackson-databind-0:2.19.1-1.el9_6.src",
"product_id": "jackson-databind-0:2.19.1-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.el9_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.el9_6.src",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.el9_6.src",
"product_id": "jackson-modules-base-0:2.19.1-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.el9_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.el9_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-core@2.19.1-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-annotations@2.19.1-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-databind@2.19.1-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-module-jaxb-annotations@2.19.1-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-json-provider@2.19.1-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-providers@2.19.1-1.el9_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.el9_6.src"
},
"product_reference": "jackson-annotations-0:2.19.1-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.el9_6.src"
},
"product_reference": "jackson-core-0:2.19.1-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.el9_6.src"
},
"product_reference": "jackson-databind-0:2.19.1-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_6.src"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.el9_6.src"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-annotations-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-core-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-core-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-databind-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T09:55:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12280"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:3467
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 5 November 2025]\nThe Synopsis was updated to fix a typo in the product version (7.4.21). No other changes have been made.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.4.\n\nSecurity Fix(es):\n\n* io.netty/netty: Denial of Service attack on windows app using Netty (CVE-2024-47535)\n\n* netty-common: Denial of Service attack on windows app using Netty (CVE-2025-25193)\n\n* io.netty/netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine (CVE-2025-24970)\n\n* org.wildfly.core/wildfly-server: Wildfly improper RBAC permission (CVE-2025-23367)\n\n* hornetq-core-client: Arbitrarily overwrite files or access sensitive information Security (CVE-2024-51127)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:3467",
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index"
},
{
"category": "external",
"summary": "2323697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323697"
},
{
"category": "external",
"summary": "2325538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2325538"
},
{
"category": "external",
"summary": "2337620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2337620"
},
{
"category": "external",
"summary": "2344787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344787"
},
{
"category": "external",
"summary": "2344788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344788"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3467.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.21 security update",
"tracking": {
"current_release_date": "2025-11-11T16:17:56+00:00",
"generator": {
"date": "2025-11-11T16:17:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:3467",
"initial_release_date": "2025-04-01T13:06:47+00:00",
"revision_history": [
{
"date": "2025-04-01T13:06:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-05T13:55:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:17:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 7",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 7",
"product_id": "Red Hat JBoss Enterprise Application Platform 7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47535",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-11-12T16:01:18.772613+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2325538"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty. An unsafe reading of the environment file could potentially cause a denial of service. When loaded on a Windows application, Netty attempts to load a file that does not exist. If an attacker creates a large file, the Netty application crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: Denial of Service attack on windows app using Netty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47535"
},
{
"category": "external",
"summary": "RHBZ#2325538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2325538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47535"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/fbf7a704a82e7449b48bd0bbb679f5661c6d61a3",
"url": "https://github.com/netty/netty/commit/fbf7a704a82e7449b48bd0bbb679f5661c6d61a3"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv",
"url": "https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv"
}
],
"release_date": "2024-11-12T15:50:08.334000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty: Denial of Service attack on windows app using Netty"
},
{
"cve": "CVE-2024-51127",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2024-11-04T18:00:59.553511+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323697"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the createTempFile method of hornetq. Affected version of hornetq allows attackers to arbitrarily overwrite files or access sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hornetq-core-client: Arbitrarily overwrite files or access sensitive information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-51127"
},
{
"category": "external",
"summary": "RHBZ#2323697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323697"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-51127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51127"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-51127",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-51127"
},
{
"category": "external",
"summary": "http://hornetq.com",
"url": "http://hornetq.com"
},
{
"category": "external",
"summary": "https://github.com/JAckLosingHeart/CWE-378/blob/main/CVE-2024-51127.md",
"url": "https://github.com/JAckLosingHeart/CWE-378/blob/main/CVE-2024-51127.md"
}
],
"release_date": "2024-11-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "workaround",
"details": "There is currently no known mitigation for this vulnerability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hornetq-core-client: Arbitrarily overwrite files or access sensitive information"
},
{
"acknowledgments": [
{
"names": [
"Claudia Bartolini",
"Marco Ventura",
"Massimiliano Brolli"
],
"organization": "TIM S.p.A"
}
],
"cve": "CVE-2025-23367",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2025-01-14T14:56:46.389000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2337620"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. \nThe vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.wildfly.core:wildfly-server: Wildfly improper RBAC permission",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has evaluated this issue and the attacker must be authenticated as a user that belongs to the \"Monitor\" or \"Auditor\" management groups. It requires previous privileges to jeopardize an environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-23367"
},
{
"category": "external",
"summary": "RHBZ#2337620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2337620"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-23367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-23367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23367"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-qr6x-62gq-4ccp",
"url": "https://github.com/advisories/GHSA-qr6x-62gq-4ccp"
}
],
"release_date": "2025-01-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.wildfly.core:wildfly-server: Wildfly improper RBAC permission"
},
{
"cve": "CVE-2025-24970",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-02-10T23:00:52.785132+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344787"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty\u0027s SslHandler. This vulnerability allows a native crash via a specially crafted packet that bypasses proper validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "io.netty:netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Netty\u0027s SslHandler is of important severity rather than moderate because it directly impacts the stability and reliability of applications using native SSLEngine. By sending a specially crafted packet, an attacker can trigger a native crash, leading to a complete process termination. Unlike typical moderate vulnerabilities that might cause limited disruptions or require specific conditions, this flaw can be exploited remotely to induce a Denial of Service (DoS), affecting high-availability systems and mission-critical services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24970"
},
{
"category": "external",
"summary": "RHBZ#2344787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24970"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4",
"url": "https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw",
"url": "https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw"
}
],
"release_date": "2025-02-10T21:57:28.730000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "io.netty:netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine"
},
{
"cve": "CVE-2025-25193",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-02-10T23:00:54.794769+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty. An unsafe reading of the environment file could cause a denial of service. When loaded on a Windows application, Netty attempts to load a file that does not exist. If an attacker creates a large file, the Netty application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: Denial of Service attack on windows app using Netty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only affects Windows environments, therefore, this would affect an environment when running a supported Red Hat JBoss EAP 7 or 8, for example, if running on Windows.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-25193"
},
{
"category": "external",
"summary": "RHBZ#2344788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-25193",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25193"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/d1fbda62d3a47835d3fb35db8bd42ecc205a5386",
"url": "https://github.com/netty/netty/commit/d1fbda62d3a47835d3fb35db8bd42ecc205a5386"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx",
"url": "https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx"
}
],
"release_date": "2025-02-10T22:02:17.197000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "workaround",
"details": "Currently, no mitigation is available for this vulnerability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty: Denial of Service attack on windows app using Netty"
},
{
"cve": "CVE-2025-48734",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2025-05-28T14:00:56.619771+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2368956"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Commons BeanUtils. This vulnerability allows remote attackers to execute arbitrary code via uncontrolled access to the declaredClass property on Java enum objects, which can expose the class loader when property paths are passed from external sources to methods like getProperty() or getNestedProperty().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "commons-beanutils: Apache Commons BeanUtils: PropertyUtilsBean does not suppresses an enum\u0027s declaredClass property by default",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because a flaw exists in Apache Commons BeanUtils, where PropertyUtilsBean and BeanUtilsBean allow uncontrolled access to the declaredClass property of Java enum objects. Applications that pass untrusted property paths directly to getProperty() or getNestedProperty() methods are at risk, as attackers can exploit this behavior to retrieve the ClassLoader instance and execute arbitrary code in the context of the affected application. This issue leads to compromise of confidentiality, integrity, and availability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-48734"
},
{
"category": "external",
"summary": "RHBZ#2368956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368956"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-48734",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48734"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-wxr5-93ph-8wr9",
"url": "https://github.com/advisories/GHSA-wxr5-93ph-8wr9"
},
{
"category": "external",
"summary": "https://github.com/apache/commons-beanutils/commit/28ad955a1613ed5885870cc7da52093c1ce739dc",
"url": "https://github.com/apache/commons-beanutils/commit/28ad955a1613ed5885870cc7da52093c1ce739dc"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9",
"url": "https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/05/28/6",
"url": "https://www.openwall.com/lists/oss-security/2025/05/28/6"
}
],
"release_date": "2025-05-28T13:32:08.300000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "commons-beanutils: Apache Commons BeanUtils: PropertyUtilsBean does not suppresses an enum\u0027s declaredClass property by default"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:10097
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP \nTools 4.17. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10097",
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10097.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.17 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-11-11T16:21:28+00:00",
"generator": {
"date": "2025-11-11T16:21:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:10097",
"initial_release_date": "2025-07-01T14:30:33+00:00",
"revision_history": [
{
"date": "2025-07-01T14:30:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T14:30:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:21:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.17",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.17::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750851690-3.el9.src",
"product": {
"name": "jenkins-0:2.504.2.1750851690-3.el9.src",
"product_id": "jenkins-0:2.504.2.1750851690-3.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750851690-3.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src",
"product": {
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src",
"product_id": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.17.1750851950-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750851690-3.el9.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750851690-3.el9.noarch",
"product_id": "jenkins-0:2.504.2.1750851690-3.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750851690-3.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"product_id": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.17.1750851950-1.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750851690-3.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750851690-3.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750851690-3.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src"
},
"product_reference": "jenkins-0:2.504.2.1750851690-3.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
},
"product_reference": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.17"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:30:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:30:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:30:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:30:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:10104
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP \nTools 4.15. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10104",
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10104.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.15 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-11-11T16:21:30+00:00",
"generator": {
"date": "2025-11-11T16:21:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:10104",
"initial_release_date": "2025-07-01T14:56:03+00:00",
"revision_history": [
{
"date": "2025-07-01T14:56:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T14:56:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:21:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.15",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.15::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750856366-3.el8.src",
"product": {
"name": "jenkins-0:2.504.2.1750856366-3.el8.src",
"product_id": "jenkins-0:2.504.2.1750856366-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750856366-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.15.1750856638-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750856366-3.el8.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750856366-3.el8.noarch",
"product_id": "jenkins-0:2.504.2.1750856366-3.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750856366-3.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.15.1750856638-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750856366-3.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750856366-3.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750856366-3.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src"
},
"product_reference": "jenkins-0:2.504.2.1750856366-3.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:56:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:56:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:56:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:56:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:14117
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the pki-deps:10.6 module is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:14117",
"url": "https://access.redhat.com/errata/RHSA-2025:14117"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14117.json"
}
],
"title": "Red Hat Security Advisory: pki-deps:10.6 security update",
"tracking": {
"current_release_date": "2025-11-07T20:55:54+00:00",
"generator": {
"date": "2025-11-07T20:55:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:14117",
"initial_release_date": "2025-08-20T00:22:33+00:00",
"revision_history": [
{
"date": "2025-08-20T00:22:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-20T00:22:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T20:55:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6)",
"product_id": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax-api@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-3.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-core@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-runtime@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-txw2@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-3.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-4.module%2Bel8.8.0%2B23413%2B86800787?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-4.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-json-provider@2.19.1-2.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-2.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch (pki-deps:10.6)",
"product_id": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-module-jaxb-annotations@2.19.1-1.module%2Bel8.8.0%2B23405%2B763e93bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.8.0%2B23405%2B763e93bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-3.module%2Bel8.8.0%2B23413%2B86800787?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-javadoc@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.62-1.module%2Bel8.8.0%2B22367%2B4894538d?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"product": {
"name": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch (pki-deps:10.6)",
"product_id": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-7.module%2Bel8.8.0%2B22365%2Bb433a336?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j-jdk14@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"product": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6)",
"product_id": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-3.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-3.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-4.module%2Bel8.8.0%2B23413%2B86800787?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-4.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-2.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.8.0%2B23405%2B763e93bf?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-3.module%2Bel8.8.0%2B23413%2B86800787?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.62-1.module%2Bel8.8.0%2B22367%2B4894538d?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"product": {
"name": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src (pki-deps:10.6)",
"product_id": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-7.module%2Bel8.8.0%2B22365%2Bb433a336?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6)",
"product_id": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6)",
"product_id": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6)",
"product_id": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-20T00:22:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:14117"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:11474
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.4.\n\nSecurity Fix(es):\n\n* jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:11474",
"url": "https://access.redhat.com/errata/RHSA-2025:11474"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11474.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.23 security update",
"tracking": {
"current_release_date": "2025-11-07T20:55:48+00:00",
"generator": {
"date": "2025-11-07T20:55:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:11474",
"initial_release_date": "2025-07-21T16:58:36+00:00",
"revision_history": [
{
"date": "2025-07-21T16:58:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-23T22:30:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T20:55:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 7",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 7",
"product_id": "Red Hat JBoss Enterprise Application Platform 7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-21T16:58:36+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:11474"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:12282
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Core part of Jackson that defines Streaming API as well as basic shared abstractions.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12282",
"url": "https://access.redhat.com/errata/RHSA-2025:12282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12282.json"
}
],
"title": "Red Hat Security Advisory: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security update",
"tracking": {
"current_release_date": "2025-11-07T20:55:49+00:00",
"generator": {
"date": "2025-11-07T20:55:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:12282",
"initial_release_date": "2025-07-30T09:45:07+00:00",
"revision_history": [
{
"date": "2025-07-30T09:45:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-30T09:45:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T20:55:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.el9_2.src",
"product": {
"name": "jackson-core-0:2.19.1-1.el9_2.src",
"product_id": "jackson-core-0:2.19.1-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.el9_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.el9_2.src",
"product": {
"name": "jackson-databind-0:2.19.1-1.el9_2.src",
"product_id": "jackson-databind-0:2.19.1-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.el9_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.el9_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.el9_2.src",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.el9_2.src",
"product_id": "jackson-modules-base-0:2.19.1-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.el9_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.el9_2.src",
"product": {
"name": "jackson-annotations-0:2.19.1-1.el9_2.src",
"product_id": "jackson-annotations-0:2.19.1-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.el9_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-core@2.19.1-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-databind@2.19.1-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-json-provider@2.19.1-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-providers@2.19.1-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-module-jaxb-annotations@2.19.1-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-annotations@2.19.1-1.el9_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_2.src"
},
"product_reference": "jackson-annotations-0:2.19.1-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:jackson-core-0:2.19.1-1.el9_2.src"
},
"product_reference": "jackson-core-0:2.19.1-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_2.src"
},
"product_reference": "jackson-databind-0:2.19.1-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_2.src"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_2.src"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-core-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-core-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T09:45:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-core-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12282"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-9.2.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-core-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-core-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:14126
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the pki-deps:10.6 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:14126",
"url": "https://access.redhat.com/errata/RHSA-2025:14126"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14126.json"
}
],
"title": "Red Hat Security Advisory: pki-deps:10.6 security update",
"tracking": {
"current_release_date": "2025-11-07T20:55:51+00:00",
"generator": {
"date": "2025-11-07T20:55:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:14126",
"initial_release_date": "2025-08-20T02:02:58+00:00",
"revision_history": [
{
"date": "2025-08-20T02:02:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-20T02:02:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T20:55:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax-api@1.2.0-16.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.10.0%2B21035%2Ba01f6469?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-core@2.2.11-12.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-runtime@2.2.11-12.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-txw2@2.2.11-12.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-json-provider@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-module-jaxb-annotations@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-javadoc@3.18.1-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.62-1.module%2Bel8.10.0%2B21257%2B2b5308b5?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j-jdk14@1.7.25-4.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax@1.2.0-16.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.2.11-12.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.10.0%2B21035%2Ba01f6469?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.62-1.module%2Bel8.10.0%2B21257%2B2b5308b5?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-20T02:02:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:14126"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:14116
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the pki-deps:10.6 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:14116",
"url": "https://access.redhat.com/errata/RHSA-2025:14116"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14116.json"
}
],
"title": "Red Hat Security Advisory: pki-deps:10.6 security update",
"tracking": {
"current_release_date": "2025-11-07T20:55:51+00:00",
"generator": {
"date": "2025-11-07T20:55:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:14116",
"initial_release_date": "2025-08-20T00:18:41+00:00",
"revision_history": [
{
"date": "2025-08-20T00:18:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-20T00:18:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T20:55:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6)",
"product_id": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax-api@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-3.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-core@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-runtime@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-txw2@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-2.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-2.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-json-provider@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-module-jaxb-annotations@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-javadoc@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"product": {
"name": "pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch (pki-deps:10.6)",
"product_id": "pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-4.0-api@9.0.30-1.module%2Bel8.4.0%2B23391%2Bb488e6bf.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.30-1.module%2Bel8.4.0%2B23391%2Bb488e6bf.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"product": {
"name": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch (pki-deps:10.6)",
"product_id": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-6.module%2Bel8.4.0%2B23399%2Bfc91639f?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j-jdk14@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"product": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6)",
"product_id": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-3.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-2.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-2.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.30-1.module%2Bel8.4.0%2B23391%2Bb488e6bf.2?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"product": {
"name": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src (pki-deps:10.6)",
"product_id": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-6.module%2Bel8.4.0%2B23399%2Bfc91639f?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-20T00:18:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:14116"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:10092
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat Product OCP \nTools 4.18. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10092",
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10092.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.18 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-11-11T16:21:28+00:00",
"generator": {
"date": "2025-11-11T16:21:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:10092",
"initial_release_date": "2025-07-01T13:48:03+00:00",
"revision_history": [
{
"date": "2025-07-01T13:48:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T13:48:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:21:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.18",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.18::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750846524-3.el9.src",
"product": {
"name": "jenkins-0:2.504.2.1750846524-3.el9.src",
"product_id": "jenkins-0:2.504.2.1750846524-3.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750846524-3.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src",
"product": {
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src",
"product_id": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.18.1750846854-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750846524-3.el9.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750846524-3.el9.noarch",
"product_id": "jenkins-0:2.504.2.1750846524-3.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750846524-3.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"product_id": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.18.1750846854-1.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750846524-3.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750846524-3.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750846524-3.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src"
},
"product_reference": "jenkins-0:2.504.2.1750846524-3.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
},
"product_reference": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.18"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T13:48:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T13:48:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T13:48:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T13:48:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:14118
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the pki-deps:10.6 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:14118",
"url": "https://access.redhat.com/errata/RHSA-2025:14118"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14118.json"
}
],
"title": "Red Hat Security Advisory: pki-deps:10.6 security update",
"tracking": {
"current_release_date": "2025-11-07T20:55:51+00:00",
"generator": {
"date": "2025-11-07T20:55:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:14118",
"initial_release_date": "2025-08-20T00:25:33+00:00",
"revision_history": [
{
"date": "2025-08-20T00:25:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-20T00:25:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T20:55:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6)",
"product_id": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax-api@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-core@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-runtime@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-txw2@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-json-provider@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-module-jaxb-annotations@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-javadoc@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"product": {
"name": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch (pki-deps:10.6)",
"product_id": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-4.0-api@9.0.30-3.module%2Bel8.6.0%2B23397%2B419fb810.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.30-3.module%2Bel8.6.0%2B23397%2B419fb810.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"product": {
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch (pki-deps:10.6)",
"product_id": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-6.module%2Bel8.6.0%2B23400%2Baafc0b27?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j-jdk14@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"product": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6)",
"product_id": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.30-3.module%2Bel8.6.0%2B23397%2B419fb810.2?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"product": {
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src (pki-deps:10.6)",
"product_id": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-6.module%2Bel8.6.0%2B23400%2Baafc0b27?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64 (pki-deps:10.6)",
"product_id": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=aarch64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"product": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64 (pki-deps:10.6)",
"product_id": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=aarch64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"product": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64 (pki-deps:10.6)",
"product_id": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=aarch64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64 (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=aarch64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6)",
"product_id": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6)",
"product_id": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6)",
"product_id": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x (pki-deps:10.6)",
"product_id": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=s390x\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"product": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x (pki-deps:10.6)",
"product_id": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=s390x\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"product": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x (pki-deps:10.6)",
"product_id": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=s390x\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=s390x\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-20T00:25:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:14118"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:12281
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Core part of Jackson that defines Streaming API as well as basic shared abstractions.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12281",
"url": "https://access.redhat.com/errata/RHSA-2025:12281"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12281.json"
}
],
"title": "Red Hat Security Advisory: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security update",
"tracking": {
"current_release_date": "2025-11-07T20:55:49+00:00",
"generator": {
"date": "2025-11-07T20:55:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:12281",
"initial_release_date": "2025-07-30T09:53:38+00:00",
"revision_history": [
{
"date": "2025-07-30T09:53:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-30T09:53:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T20:55:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.el9_4.src",
"product": {
"name": "jackson-core-0:2.19.1-1.el9_4.src",
"product_id": "jackson-core-0:2.19.1-1.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.el9_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.el9_4.src",
"product": {
"name": "jackson-databind-0:2.19.1-1.el9_4.src",
"product_id": "jackson-databind-0:2.19.1-1.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.el9_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.el9_4.src",
"product": {
"name": "jackson-annotations-0:2.19.1-1.el9_4.src",
"product_id": "jackson-annotations-0:2.19.1-1.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.el9_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.el9_4.src",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.el9_4.src",
"product_id": "jackson-modules-base-0:2.19.1-1.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.el9_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.el9_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-core@2.19.1-1.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-databind@2.19.1-1.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-annotations@2.19.1-1.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-module-jaxb-annotations@2.19.1-1.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-json-provider@2.19.1-1.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-providers@2.19.1-1.el9_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:jackson-annotations-0:2.19.1-1.el9_4.src"
},
"product_reference": "jackson-annotations-0:2.19.1-1.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:jackson-core-0:2.19.1-1.el9_4.src"
},
"product_reference": "jackson-core-0:2.19.1-1.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:jackson-databind-0:2.19.1-1.el9_4.src"
},
"product_reference": "jackson-databind-0:2.19.1-1.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_4.src"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:jackson-modules-base-0:2.19.1-1.el9_4.src"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-annotations-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-core-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-core-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-databind-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:jackson-annotations-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-core-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-databind-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-modules-base-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T09:53:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:jackson-annotations-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-core-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-databind-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-modules-base-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12281"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:jackson-annotations-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-core-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-databind-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-modules-base-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:jackson-annotations-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-core-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-databind-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-modules-base-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:10120
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP \nTools 4.14. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10120",
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10120.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.14 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-11-11T16:21:31+00:00",
"generator": {
"date": "2025-11-11T16:21:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:10120",
"initial_release_date": "2025-07-01T16:53:09+00:00",
"revision_history": [
{
"date": "2025-07-01T16:53:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T16:53:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:21:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.14",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.14::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750903189-3.el8.src",
"product": {
"name": "jenkins-0:2.504.2.1750903189-3.el8.src",
"product_id": "jenkins-0:2.504.2.1750903189-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750903189-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.14.1750903529-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750903189-3.el8.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750903189-3.el8.noarch",
"product_id": "jenkins-0:2.504.2.1750903189-3.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750903189-3.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.14.1750903529-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750903189-3.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750903189-3.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750903189-3.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src"
},
"product_reference": "jenkins-0:2.504.2.1750903189-3.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.14"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:53:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:53:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:53:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:53:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:15717
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A new security update is now available for Red Hat Single Sign-On 7.6 from the Customer Portal.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis update to Red Hat Single Sign-On 7.6.12 includes a security update with important impact.\n\nSecurity fixes:\n* jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15717",
"url": "https://access.redhat.com/errata/RHSA-2025:15717"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15717.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.12 security update",
"tracking": {
"current_release_date": "2025-11-07T20:55:54+00:00",
"generator": {
"date": "2025-11-07T20:55:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:15717",
"initial_release_date": "2025-09-11T19:39:47+00:00",
"revision_history": [
{
"date": "2025-09-11T19:39:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-11T19:39:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T20:55:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Single Sign-On 7.6.12",
"product": {
"name": "Red Hat Single Sign-On 7.6.12",
"product_id": "Red Hat Single Sign-On 7.6.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Single Sign-On"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Single Sign-On 7.6.12"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-11T19:39:47+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Single Sign-On 7.6.12"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15717"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"Red Hat Single Sign-On 7.6.12"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Single Sign-On 7.6.12"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:10119
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat Product OCP \nTools 4.13. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10119",
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10119.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.13 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-11-11T16:21:32+00:00",
"generator": {
"date": "2025-11-11T16:21:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:10119",
"initial_release_date": "2025-07-01T16:31:24+00:00",
"revision_history": [
{
"date": "2025-07-01T16:31:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T16:31:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:21:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.13",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.13::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750916374-3.el8.src",
"product": {
"name": "jenkins-0:2.504.2.1750916374-3.el8.src",
"product_id": "jenkins-0:2.504.2.1750916374-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750916374-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.13.1750916671-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750916374-3.el8.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750916374-3.el8.noarch",
"product_id": "jenkins-0:2.504.2.1750916374-3.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750916374-3.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.13.1750916671-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750916374-3.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750916374-3.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750916374-3.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src"
},
"product_reference": "jenkins-0:2.504.2.1750916374-3.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.13"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:17189
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Logging for Red Hat OpenShift - 5.8.22",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Logging 5.8.22 is a cluster-wide logging solution for OpenShift that collects and manages applications, infrastructure, and audit logs.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:17189",
"url": "https://access.redhat.com/errata/RHSA-2025:17189"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-52999",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_17189.json"
}
],
"title": "Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.8.22",
"tracking": {
"current_release_date": "2025-11-07T20:55:55+00:00",
"generator": {
"date": "2025-11-07T20:55:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:17189",
"initial_release_date": "2025-10-01T18:01:13+00:00",
"revision_history": [
{
"date": "2025-10-01T18:01:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-01T18:01:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T20:55:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Logging for Red Hat OpenShift 5.8",
"product": {
"name": "Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:5.8::el9"
}
}
}
],
"category": "product_family",
"name": "Logging for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256%3A10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256%3A5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-operator-bundle@sha256%3A5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel9-operator@sha256%3A22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel9@sha256%3Abf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"product_id": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256%3A6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"product_id": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel9@sha256%3A13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel9@sha256%3A686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"product_id": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256%3A21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"product_id": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel9@sha256%3A7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"product_id": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256%3A5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64",
"product_id": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256%3Af5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"product_id": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel9@sha256%3A9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"product_id": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-operator-bundle@sha256%3Adf31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"product_id": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256%3A7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"product_id": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256%3A2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"product_id": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256%3Acec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256%3A451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel9-operator@sha256%3A8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel9@sha256%3A7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"product_id": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256%3Ada617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"product_id": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel9@sha256%3Ab4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel9@sha256%3A3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"product_id": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256%3A2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"product_id": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel9@sha256%3A08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"product_id": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256%3A1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"product_id": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256%3A3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"product_id": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel9@sha256%3Aba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"product_id": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256%3A39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"product_id": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256%3Aa856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"product_id": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256%3A719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256%3Ae497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel9-operator@sha256%3Ab8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel9@sha256%3Af76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256%3Aa474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel9@sha256%3A8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel9@sha256%3A9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256%3A6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel9@sha256%3A3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256%3A0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256%3Ace751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel9@sha256%3Ab169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256%3Ac3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256%3A5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256%3A90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256%3A3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel9-operator@sha256%3A7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel9@sha256%3A5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"product_id": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256%3Ab5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"product_id": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel9@sha256%3A7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel9@sha256%3A128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"product_id": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256%3Abba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"product_id": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel9@sha256%3Ae3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"product_id": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256%3A593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"product_id": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256%3A38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"product_id": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel9@sha256%3Aa49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"product_id": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256%3A107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"product_id": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256%3Ab7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"product_id": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256%3Aeed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le"
],
"known_not_affected": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-01T18:01:13+00:00",
"details": "For OpenShift Container Platform 4.14 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html/release_notes/ocp-4-14-release-notes\n\nFor Red Hat OpenShift Logging 5.8, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.14/logging/cluster-logging-upgrading.html",
"product_ids": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:17189"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:11473
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.4.\n\nSecurity Fix(es):\n\n* jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:11473",
"url": "https://access.redhat.com/errata/RHSA-2025:11473"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11473.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update",
"tracking": {
"current_release_date": "2025-11-07T20:55:48+00:00",
"generator": {
"date": "2025-11-07T20:55:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:11473",
"initial_release_date": "2025-07-21T17:07:33+00:00",
"revision_history": [
{
"date": "2025-07-21T17:07:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-21T17:07:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T20:55:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 8",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 9",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_id": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-providers@2.12.7-2.redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_id": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-providers@2.12.7-2.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_id": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-providers@2.12.7-2.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el9eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-base@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-json-provider@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-module-jaxb-annotations@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jdk8@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jsr310@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.23-4.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.23-4.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.23-4.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.23-4.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-base@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-json-provider@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jdk8@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jsr310@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-module-jaxb-annotations@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-base@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-json-provider@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-module-jaxb-annotations@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jdk8@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jsr310@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-21T17:07:33+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:11473"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
}
],
"initial_release_date": "2025-09-05T00:00:00",
"last_revision_date": "2025-09-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2025-AVI-0760
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | User Entity Behavior Analytics pour IBM QRadar SIEM versions antérieures à 5.0.1 | ||
| IBM | WebSphere | IBM Common Licensing pour Websphere Liberty Agent versions 9.0.x antérieures à 9.0.0.2 | ||
| IBM | Db2 | Db2 on Cloud Pak for Data versions antérieures à v5.2.1 | ||
| IBM | WebSphere | IBM Enterprise Application Runtimes pour WebSphere Application Server version 1.0 sans les correctif de sécurité APAR PH67137 et APAR PH67132 | ||
| IBM | WebSphere | Engineering Test Management versions 7.0.2 et 7.0.3 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | Engineering Lifecycle Management 7.0.2 et 7.0.3 pour WebSphere Application Server Liberty versions 17.0.0.3 à 25.0.0.8 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | IBM Common Licensing pour Websphere Liberty ART versions 9.0.x antérieures à 9.0.0.2 | ||
| IBM | WebSphere | Engineering Lifecycle Management 7.1 pour WebSphere Application Server Liberty versions 17.0.0.3 à 25.0.0.8 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | Cloud Pak for Applications versions 5.1 à 5.3 pour WebSphere Application Server Liberty sans les correctifs de sécurité APAR PH67132 et APAR PH67137 | ||
| IBM | WebSphere | Engineering Test Management versions 7.1 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | WebSphere Application Server and WebSphere Application Server Liberty, avec les fonctionnalités jsonp sans le dernier correctif de sécurité | ||
| IBM | WebSphere | WebSphere Hybrid Edition version 5.1 sans les correctifs de sécurité APAR PH67137, APAR PH67132, | ||
| IBM | Db2 | Db2 Warehouse on Cloud Pak for Data versions antérieures à v5.2.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "User Entity Behavior Analytics pour IBM QRadar SIEM versions ant\u00e9rieures \u00e0 5.0.1",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Common Licensing pour Websphere Liberty Agent versions 9.0.x ant\u00e9rieures \u00e0 9.0.0.2",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v5.2.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Enterprise Application Runtimes pour WebSphere Application Server version 1.0 sans les correctif de s\u00e9curit\u00e9 APAR PH67137 et APAR PH67132",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Test Management versions 7.0.2 et 7.0.3 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Lifecycle Management 7.0.2 et 7.0.3 pour WebSphere Application Server Liberty versions 17.0.0.3 \u00e0 25.0.0.8 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Common Licensing pour Websphere Liberty ART versions 9.0.x ant\u00e9rieures \u00e0 9.0.0.2",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Lifecycle Management 7.1 pour WebSphere Application Server Liberty versions 17.0.0.3 \u00e0 25.0.0.8 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Applications versions 5.1 \u00e0 5.3 pour WebSphere Application Server Liberty sans les correctifs de s\u00e9curit\u00e9 APAR PH67132 et APAR PH67137",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Test Management versions 7.1 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server and WebSphere Application Server Liberty, avec les fonctionnalit\u00e9s jsonp sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Hybrid Edition version 5.1 sans les correctifs de s\u00e9curit\u00e9 APAR PH67137, APAR PH67132,",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Warehouse on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v5.2.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-31129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31129"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2025-0755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0755"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-55565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55565"
},
{
"name": "CVE-2024-51473",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51473"
},
{
"name": "CVE-2015-5237",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5237"
},
{
"name": "CVE-2025-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3445"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46762"
},
{
"name": "CVE-2025-32421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32421"
},
{
"name": "CVE-2016-4055",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4055"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2024-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-30472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30472"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2024-45813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45813"
},
{
"name": "CVE-2022-36364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36364"
},
{
"name": "CVE-2023-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5868"
},
{
"name": "CVE-2025-48050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48050"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-33092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33092"
},
{
"name": "CVE-2024-51479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51479"
},
{
"name": "CVE-2025-1647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1647"
},
{
"name": "CVE-2023-39417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39417"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2024-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
},
{
"name": "CVE-2024-11831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11831"
},
{
"name": "CVE-2018-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7489"
},
{
"name": "CVE-2025-33143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33143"
},
{
"name": "CVE-2021-3393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3393"
},
{
"name": "CVE-2025-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2533"
},
{
"name": "CVE-2019-10202",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10202"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2025-36097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36097"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2025-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36010"
},
{
"name": "CVE-2025-36047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36047"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2022-49846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49846"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2023-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5869"
},
{
"name": "CVE-2024-8184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8184"
},
{
"name": "CVE-2025-48068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48068"
},
{
"name": "CVE-2024-48949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48949"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33114"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2022-41862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2023-22467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22467"
},
{
"name": "CVE-2022-24823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24823"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-48948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2019-9193",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9193"
},
{
"name": "CVE-2018-5968",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5968"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2024-56332",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56332"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2022-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24785"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2017-7525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7525"
},
{
"name": "CVE-2023-26133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26133"
},
{
"name": "CVE-2024-6484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6484"
},
{
"name": "CVE-2024-6485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6485"
},
{
"name": "CVE-2023-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2454"
},
{
"name": "CVE-2024-9823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9823"
},
{
"name": "CVE-2025-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
},
{
"name": "CVE-2024-56339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56339"
},
{
"name": "CVE-2024-49767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
},
{
"name": "CVE-2022-1552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1552"
},
{
"name": "CVE-2024-49828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49828"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2025-29927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29927"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2017-18214",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18214"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-36071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36071"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2017-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15095"
},
{
"name": "CVE-2024-36114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2019-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12086"
},
{
"name": "CVE-2024-6827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6827"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2021-21290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21290"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2022-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2625"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2017-17485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17485"
},
{
"name": "CVE-2024-6762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6762"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2024-52894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52894"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2025-6442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6442"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-51504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51504"
},
{
"name": "CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-21756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21756"
},
{
"name": "CVE-2018-1000873",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000873"
},
{
"name": "CVE-2023-32305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32305"
},
{
"name": "CVE-2025-47287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47287"
},
{
"name": "CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"initial_release_date": "2025-09-05T00:00:00",
"last_revision_date": "2025-09-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0760",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243927",
"url": "https://www.ibm.com/support/pages/node/7243927"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243923",
"url": "https://www.ibm.com/support/pages/node/7243923"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243924",
"url": "https://www.ibm.com/support/pages/node/7243924"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244012",
"url": "https://www.ibm.com/support/pages/node/7244012"
},
{
"published_at": "2025-09-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243659",
"url": "https://www.ibm.com/support/pages/node/7243659"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244002",
"url": "https://www.ibm.com/support/pages/node/7244002"
},
{
"published_at": "2025-08-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243582",
"url": "https://www.ibm.com/support/pages/node/7243582"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243928",
"url": "https://www.ibm.com/support/pages/node/7243928"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243925",
"url": "https://www.ibm.com/support/pages/node/7243925"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244010",
"url": "https://www.ibm.com/support/pages/node/7244010"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243922",
"url": "https://www.ibm.com/support/pages/node/7243922"
},
{
"published_at": "2025-09-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243673",
"url": "https://www.ibm.com/support/pages/node/7243673"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243877",
"url": "https://www.ibm.com/support/pages/node/7243877"
}
]
}
CERTFR-2025-AVI-0838
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.109 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.2406 antérieures à 9.2.2406.123 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2408 antérieures à 9.3.2408.119 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.0.x antérieures à 10.0.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.2.2406 antérieures à 9.2.2406.123 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.0.x antérieures à 10.0.0 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.2.x antérieures à 9.2.8 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.4 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.6 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2411 antérieures à 9.3.2411.108 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2408 antérieures à 9.3.2408.118 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.111 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.109",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.2.2406 ant\u00e9rieures \u00e0 9.2.2406.123",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2408 ant\u00e9rieures \u00e0 9.3.2408.119",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.2.2406 ant\u00e9rieures \u00e0 9.2.2406.123",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.0",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.8",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.4",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.6",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.108",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.3.2408 ant\u00e9rieures \u00e0 9.3.2408.118",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.111",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"name": "CVE-2015-5237",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5237"
},
{
"name": "CVE-2025-20367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20367"
},
{
"name": "CVE-2024-7553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7553"
},
{
"name": "CVE-2025-20366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20366"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2022-37601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
},
{
"name": "CVE-2025-20370",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20370"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20369"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1351"
},
{
"name": "CVE-2025-20371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20371"
},
{
"name": "CVE-2025-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20368"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
}
],
"initial_release_date": "2025-10-02T00:00:00",
"last_revision_date": "2025-10-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0838",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1006",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1006"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1005",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1005"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1002",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1002"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1004",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1004"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1007",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1007"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1003",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1003"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1001",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1001"
}
]
}
CERTFR-2025-AVI-0754
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Gemfire | Tanzu GemFire Management Console versions antérieures à 1.4.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 7.5.4 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu GemFire Management Console versions ant\u00e9rieures \u00e0 1.4.0",
"product": {
"name": "Tanzu Gemfire",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 7.5.4",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2021-45078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2024-6104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
},
{
"name": "CVE-2022-44840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"initial_release_date": "2025-09-04T00:00:00",
"last_revision_date": "2025-09-04T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0754",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 VMware TNZ-2025-0094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36085"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 VMware TNZ-2025-0095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36086"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
fkie_cve-2025-52999
Vulnerability from fkie_nvd
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "jackson-core contains core low-level incremental (\"streaming\") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources."
},
{
"lang": "es",
"value": "jackson-core contiene las abstracciones principales del analizador incremental (\"streaming\") de bajo nivel y del generador utilizadas por Jackson Data Processor. En versiones anteriores a la 2.15.0, si un usuario analiza un archivo de entrada con datos profundamente anidados, Jackson pod\u00eda generar un error de Stackoverflow si la profundidad era excesiva. jackson-core 2.15.0 incluye un l\u00edmite configurable para la profundidad que Jackson recorrer\u00e1 en un documento de entrada, con una profundidad predeterminada de 1000. jackson-core generar\u00e1 una excepci\u00f3n StreamConstraintsException si se alcanza el l\u00edmite. jackson-databind tambi\u00e9n se beneficia de este cambio, ya que utiliza jackson-core para analizar las entradas JSON. Como soluci\u00f3n alternativa, se recomienda a los usuarios evitar analizar archivos de entrada de fuentes no confiables."
}
],
"id": "CVE-2025-52999",
"lastModified": "2025-06-26T18:57:43.670",
"metrics": {
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2025-06-25T17:15:39.820",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-121"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
wid-sec-w-2025-1405
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Jackson ist eine quelloffene Bibliothek zur JSON-Verarbeitung in Java.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in FasterXML Jackson ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1405 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1405.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1405 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1405"
},
{
"category": "external",
"summary": "FasterXML GitHub Security Advisory vom 2025-06-25",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
},
{
"category": "external",
"summary": "Red Hat Bugtracker vom 2025-06-25",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10098 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10092 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10118 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10119 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10104 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10120 vom 2025-07-02",
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10097 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11474 vom 2025-07-21",
"url": "https://access.redhat.com/errata/RHSA-2025:11474"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11473 vom 2025-07-21",
"url": "https://access.redhat.com/errata/RHSA-2025:11473"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12280 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12280"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12281 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12281"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12282 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12282"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12283 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12283"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-2934 vom 2025-07-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2934.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-12280 vom 2025-07-31",
"url": "https://linux.oracle.com/errata/ELSA-2025-12280.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14118 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14118"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14126 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14126"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14127 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14127"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14117 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14117"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14116 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14116"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14126 vom 2025-08-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-14126.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14546 vom 2025-08-26",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-August/018456.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:14126 vom 2025-09-08",
"url": "https://errata.build.resf.org/RLSA-2025:14126"
}
],
"source_lang": "en-US",
"title": "FasterXML Jackson: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2025-09-08T22:00:00.000+00:00",
"generator": {
"date": "2025-09-09T07:47:10.300+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1405",
"initial_release_date": "2025-06-25T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-06-25T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-07-01T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-29T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-26T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
}
],
"status": "final",
"version": "10"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.15.0",
"product": {
"name": "FasterXML Jackson \u003c2.15.0",
"product_id": "T044863"
}
},
{
"category": "product_version",
"name": "2.15.0",
"product": {
"name": "FasterXML Jackson 2.15.0",
"product_id": "T044863-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:fasterxml:jackson:2.15.0"
}
}
}
],
"category": "product_name",
"name": "Jackson"
}
],
"category": "vendor",
"name": "FasterXML"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Developer Tools and Services 4.14",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.14",
"product_id": "T031233",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.14"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.16",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.16",
"product_id": "T044977",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.16"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.17",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.17",
"product_id": "T044978",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.17"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.18",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.18",
"product_id": "T044979",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.18"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.15",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.15",
"product_id": "T044980",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.15"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.13",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.13",
"product_id": "T044981",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.13"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.12",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.12",
"product_id": "T044982",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.12"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"product_status": {
"known_affected": [
"T044863",
"T031233",
"T044977",
"67646",
"T044979",
"T044978",
"398363",
"T004914",
"T044980",
"T032255",
"T044982",
"T044981"
]
},
"release_date": "2025-06-25T22:00:00.000+00:00",
"title": "CVE-2025-52999"
}
]
}
ncsc-2025-0330
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communications producten, waaronder de Unified Assurance en Cloud Native Core.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden in de Oracle Communications producten stellen kwaadwillenden in staat om ongeautoriseerde toegang te verkrijgen, wat kan leiden tot gedeeltelijke of volledige Denial-of-Service (DoS) aanvallen. Specifiek kunnen aanvallers met netwerktoegang de systemen compromitteren, wat resulteert in ongeautoriseerde toegang tot gevoelige gegevens. De CVSS-scores van deze kwetsbaarheden vari\u00ebren van 3.1 tot 9.8, wat wijst op een breed scala aan risico\u0027s, van beperkte tot ernstige impact op de vertrouwelijkheid, integriteit en beschikbaarheid van de systemen.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden in zijn Communications producten te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)",
"title": "CWE-124"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Improper Neutralization of Input Terminators",
"title": "CWE-147"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "general",
"text": "Improper Handling of Unexpected Data Type",
"title": "CWE-241"
},
{
"category": "general",
"text": "Unchecked Return Value",
"title": "CWE-252"
},
{
"category": "general",
"text": "Incorrect Check of Function Return Value",
"title": "CWE-253"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Authentication Bypass by Spoofing",
"title": "CWE-290"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Improper Handling of Highly Compressed Data (Data Amplification)",
"title": "CWE-409"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Incorrect Comparison",
"title": "CWE-697"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "general",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "general",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://www.oracle.com/security-alerts/cpuoct2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Communications producten",
"tracking": {
"current_release_date": "2025-10-23T13:20:15.363063Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2025-0330",
"initial_release_date": "2025-10-23T13:20:15.363063Z",
"revision_history": [
{
"date": "2025-10-23T13:20:15.363063Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "Management Cloud Engine"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "Oracle Communications Billing and Revenue Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "Oracle Communications Calendar Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-5"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Automated Test Suite"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-6"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Binding Support Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-7"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Certificate Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-8"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core DBTier"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-9"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-10"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Repository Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-11"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Slice Selection Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-12"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Policy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-13"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-14"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Service Communication Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-15"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Unified Data Repository"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-16"
}
}
],
"category": "product_name",
"name": "Oracle Communications Converged Charging System"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-17"
}
}
],
"category": "product_name",
"name": "Oracle Communications Convergence"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-18"
}
}
],
"category": "product_name",
"name": "Oracle Communications Convergent Charging Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-19"
}
}
],
"category": "product_name",
"name": "Oracle Communications Diameter Signaling Router"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-20"
}
}
],
"category": "product_name",
"name": "Oracle Communications EAGLE Element Management System"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-21"
}
}
],
"category": "product_name",
"name": "Oracle Communications EAGLE LNP Application Processor"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-22"
}
}
],
"category": "product_name",
"name": "Oracle Communications LSMS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-23"
}
}
],
"category": "product_name",
"name": "Oracle Communications Messaging Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-24"
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Analytics Data Director"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-25"
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Charging and Control"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-26"
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Integrity"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-27"
}
}
],
"category": "product_name",
"name": "Oracle Communications Offline Mediation Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-28"
}
}
],
"category": "product_name",
"name": "Oracle Communications Operations Monitor"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-29"
}
}
],
"category": "product_name",
"name": "Oracle Communications Order and Service Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-30"
}
}
],
"category": "product_name",
"name": "Oracle Communications Pricing Design Center"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-31"
}
}
],
"category": "product_name",
"name": "Oracle Communications Service Catalog and Design"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-32"
}
}
],
"category": "product_name",
"name": "Oracle Communications Session Border Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-33"
}
}
],
"category": "product_name",
"name": "Oracle Communications Unified Assurance"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-34"
}
}
],
"category": "product_name",
"name": "Oracle Communications Unified Inventory Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-35"
}
}
],
"category": "product_name",
"name": "Oracle Enterprise Communications Broker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-36"
}
}
],
"category": "product_name",
"name": "Oracle Enterprise Operations Monitor"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Recent updates address vulnerabilities in NTP 4.2.8p17 and Oracle products, including CVE-2023-26555 related to malformed RT-11 dates and various security issues in Oracle Communications and Database systems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26555 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-26555.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2023-26555"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple vulnerabilities across various Oracle, IBM, and Protobuf products could lead to Denial of Service and unauthorized access, with significant risks identified in versions of Oracle Communications, MySQL Connector/J, and IBM WebSphere.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-8006",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Oracle Communications products and the libpcap library allow high-privileged attackers to cause denial of service and NULL pointer dereference issues, with CVSS scores of 4.4 for the former.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8006 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-8006.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-8006"
},
{
"cve": "CVE-2024-12133",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "description",
"text": "Multiple vulnerabilities affecting Oracle Communications EAGLE LNP Application Processor, Oracle Communications Cloud Native Core Policy, and libtasn1 could lead to denial of service attacks, with CVSS scores of 5.3 for some products.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12133 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-12133"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle MySQL, Oracle Communications, and nghttp2 products allow remote attackers to exploit confidentiality, integrity, and availability, with varying damage ratings from medium to high.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-35164",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Unified Assurance and Apache Guacamole could allow high-privileged attackers to compromise systems and execute arbitrary code, respectively.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35164 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-35164.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-35164"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle products, including Communications and MySQL, as well as MIT Kerberos 5, allow for unauthorized access, denial of service, and other malicious activities, with CVSS scores reaching 9.1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Middleware, Documaker, and Apache Commons IO components allow unauthenticated attackers to exploit denial of service risks, with CVSS scores ranging from 4.3 to 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-50609",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Fluent Bit 3.1.9 has a vulnerability allowing remote Denial of Service attacks via a zero-length packet, while Oracle Communications Unified Assurance versions 6.1.0-6.1.1 can be exploited by high-privileged attackers for complete Denial of Service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50609 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-50609.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-50609"
},
{
"cve": "CVE-2024-51504",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass by Spoofing",
"title": "CWE-290"
},
{
"category": "description",
"text": "Recent vulnerabilities in Apache ZooKeeper and Oracle Communications Unified Assurance expose systems to authentication bypass and unauthorized access, allowing attackers to execute commands and access critical data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-51504 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-51504.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-51504"
},
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple security vulnerabilities across various Oracle products and the Netplex Json-smart library can lead to Denial of Service (DoS) due to stack exhaustion and other exploits, affecting versions 2.5.0 to 2.5.1 and specific Oracle software.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57699 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57699.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-57699"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Eclipse Jetty versions 12.0.0 to 12.0.16 are vulnerable to OutOfMemoryError and denial of service attacks due to improper validation of the SETTINGS_MAX_HEADER_LIST_SIZE parameter, affecting various products including Oracle Communications EAGLE and NetApp.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1948 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-1948.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-1948"
},
{
"cve": "CVE-2025-3576",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"notes": [
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "description",
"text": "Recent vulnerabilities in krb5 and MIT Kerberos implementations allow for message spoofing via MD5 checksum weaknesses, while Oracle Communications Network Analytics Data Director is susceptible to unauthorized data manipulation through SSH access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-3576 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-3576.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-3576"
},
{
"cve": "CVE-2025-4373",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)",
"title": "CWE-124"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core and glib2 involve unauthorized access risks and buffer overflow issues, affecting multiple products with varying severity levels.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4373 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4373.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L/E:U",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-4373"
},
{
"cve": "CVE-2025-4517",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "description",
"text": "Recent updates to Python versions 3.6 through 3.13.5 address multiple security vulnerabilities, particularly in the tarfile module, while enhancing various functionalities and resolving issues related to memory management and IPv6 handling.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4517 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4517.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-4517"
},
{
"cve": "CVE-2025-4802",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"notes": [
{
"category": "other",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "description",
"text": "Vulnerabilities in Oracle Communications Cloud Native Core and glibc allow unauthenticated access and privilege escalation, with CVSS scores of 7.8, affecting confidentiality, integrity, and availability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4802 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4802.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-4802"
},
{
"cve": "CVE-2025-5115",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "The \u0027MadeYouReset\u0027 vulnerability in HTTP/2 affects certain Jetty versions, allowing denial of service through malformed control frames, while additional vulnerabilities exist in Oracle Communications and SAP Commerce Cloud.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5115 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5115.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5115"
},
{
"cve": "CVE-2025-5318",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle MySQL Workbench and the libssh library expose sensitive data and allow unauthorized access, with CVSS scores indicating moderate severity.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5318 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5318.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5318"
},
{
"cve": "CVE-2025-5399",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Oracle MySQL Server and Cluster, along with libcurl\u0027s WebSocket code, allow for various denial of service attacks, with CVSS scores ranging from 4.3 to 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5399 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5399.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5399"
},
{
"cve": "CVE-2025-5889",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "The juliangruber brace-expansion library has a vulnerability in versions up to 4.0.0 affecting the expand function, while Oracle Communications Unified Assurance versions 6.1.0-6.1.1 are susceptible to a partial denial of service by low-privileged attackers.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5889 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5889.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5889"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"notes": [
{
"category": "other",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "description",
"text": "Critical vulnerabilities in Oracle Communications Cloud Native Core and SQLite versions prior to 3.50.2 expose systems to severe risks, including memory corruption and integer truncation issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:D/RE:L/U:Green",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6965 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-6965.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-6965"
},
{
"cve": "CVE-2025-7339",
"cwe": {
"id": "CWE-241",
"name": "Improper Handling of Unexpected Data Type"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Unexpected Data Type",
"title": "CWE-241"
},
{
"category": "description",
"text": "Oracle Communications Unified Assurance has a vulnerability allowing unauthorized data access, while the on-headers middleware for Node.js has a bug affecting response header modifications in versions prior to 1.1.0.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7339 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7339.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-7339"
},
{
"cve": "CVE-2025-7425",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core and libxslt expose systems to unauthorized access and memory corruption, with significant impacts on integrity and availability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7425 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-7425"
},
{
"cve": "CVE-2025-7962",
"cwe": {
"id": "CWE-147",
"name": "Improper Neutralization of Input Terminators"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input Terminators",
"title": "CWE-147"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core Console and Jakarta Mail versions 2.0.2 and 2.2 expose systems to significant risks, including unauthorized access and SMTP Injection attacks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:L/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7962 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7962.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-7962"
},
{
"cve": "CVE-2025-8058",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Enterprise Operations Monitor and GNU C library versions 2.4 to 2.41 expose systems to potential unauthorized access, memory corruption, and denial of service risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8058 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8058.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-8058"
},
{
"cve": "CVE-2025-8916",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Bouncy Castle for Java and BCPKIX FIPS have a vulnerability allowing excessive resource allocation, while Oracle Communications Cloud Native Core Certificate Management and certain NetApp products face denial of service risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/S:P/R:U/RE:M/U:Amber",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8916 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8916.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-8916"
},
{
"cve": "CVE-2025-9086",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "The curl update 8.14.1 addresses security vulnerabilities, including out-of-bounds reads, proxy cache poisoning, and a bug allowing insecure sites to override secure cookies, alongside a denial of service vulnerability in Oracle Communications Unified Inventory Management.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9086 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9086.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-9086"
},
{
"cve": "CVE-2025-25724",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"notes": [
{
"category": "other",
"text": "Unchecked Return Value",
"title": "CWE-252"
},
{
"category": "description",
"text": "Multiple vulnerabilities have been identified in Oracle Communications Network Analytics Data Director and the libarchive component, affecting system integrity and availability, with CVSS scores indicating significant risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-25724 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-25724.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-25724"
},
{
"cve": "CVE-2025-27210",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "description",
"text": "Node.js versions 20.x, 22.x, and 24.x have an incomplete fix for CVE-2025-23084 affecting Windows device names and the `path.join` API, while Oracle Communications\u0027 Cloud Native Environment has a non-exploitable Security-in-Depth issue.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27210 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27210.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27210"
},
{
"cve": "CVE-2025-27533",
"cwe": {
"id": "CWE-789",
"name": "Memory Allocation with Excessive Size Value"
},
"notes": [
{
"category": "other",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Apache ActiveMQ and Oracle products allow for denial of service attacks due to improper validation and excessive memory allocation, affecting various versions and configurations.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:D/RE:M/U:Red",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27533 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27533.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27533"
},
{
"cve": "CVE-2025-27553",
"cwe": {
"id": "CWE-23",
"name": "Relative Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Middleware and Apache Commons VFS expose critical data and allow unauthorized file access, with significant risks associated with their exploitation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27553 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27553.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27553"
},
{
"cve": "CVE-2025-27587",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"notes": [
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "description",
"text": "OpenSSL versions 3.0.0 to 3.3.2 on PowerPC are vulnerable to a Minerva attack, while Oracle Communications Cloud Native Core Certificate Management 25.1.200 has a critical data access vulnerability, and OpenSSL 3 has addressed timing side channel issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27587 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27587.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27587"
},
{
"cve": "CVE-2025-27817",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Apache Kafka and Oracle applications allow unauthorized access to sensitive data, with notable SSRF risks and CVSS scores of 7.5 for Oracle products.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27817 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27817"
},
{
"cve": "CVE-2025-32415",
"cwe": {
"id": "CWE-1284",
"name": "Improper Validation of Specified Quantity in Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple vulnerabilities have been identified in Oracle Java SE and libxml2, allowing for potential system compromise and denial of service, with CVSS scores of 7.5 for several issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32415 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32415.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-32415"
},
{
"cve": "CVE-2025-32728",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Enterprise Communications Broker, OpenSSH, and HP-UX Secure Shell daemon could lead to unauthorized data access and system compromise, with varying CVSS scores and exploitation potential.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32728 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32728.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-32728"
},
{
"cve": "CVE-2025-32990",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Unified Inventory Management and GnuTLS\u0027s certtool expose systems to denial-of-service and unauthorized data access, with significant integrity impacts and a CVSS score of 8.2 for Oracle\u0027s flaw.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32990 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32990.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-32990"
},
{
"cve": "CVE-2025-48734",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "description",
"text": "Recent updates to Apache Commons BeanUtils address multiple vulnerabilities, including arbitrary code execution risks and unauthorized access to Java enum properties, affecting versions prior to 1.11.0 and 2.0.0-M2.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48734 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48734.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48734"
},
{
"cve": "CVE-2025-48924",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle WebLogic Server and Apache Commons Lang versions expose systems to denial of service risks, including an uncontrolled recursion flaw leading to StackOverflowErrors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48924 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48924.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48924"
},
{
"cve": "CVE-2025-48976",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple vulnerabilities affecting Oracle Application Testing Suite and Apache Commons FileUpload, including DoS risks due to insufficient multipart header limits, have been identified, with CVSS scores reaching 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48976 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48976"
},
{
"cve": "CVE-2025-48989",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Recent updates for Apache Tomcat versions 9, 10, and 11 address the \u0027MadeYouReset\u0027 DoS vulnerability in HTTP/2, along with various enhancements to components like Catalina and Coyote.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48989 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48989.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48989"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Recent updates for libxml2 address multiple vulnerabilities, including heap use after free and type confusion, which could lead to denial of service or crashes, alongside an Oracle vulnerability allowing unauthorized data access.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49796 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49796.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-49796"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "description",
"text": "Oracle Communications Unified Assurance has a vulnerability allowing denial of service, while jackson-core versions prior to 2.15.0 can cause StackoverflowError with deeply nested data, now mitigated in version 2.15.0.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-52999 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-52999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-52999"
},
{
"cve": "CVE-2025-53547",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "description",
"text": "Helm v3.18.4 addresses a critical vulnerability allowing local code execution through crafted `Chart.yaml` and symlinked `Chart.lock` files during dependency updates, alongside an Oracle Communications flaw with a CVSS score of 8.6.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53547 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53547.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-53547"
},
{
"cve": "CVE-2025-53643",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Operations Monitor and aiohttp could allow unauthorized access and data manipulation, with significant integrity impacts and request smuggling risks in affected versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53643 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53643.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-53643"
},
{
"cve": "CVE-2025-53864",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle GoldenGate and Connect2id Nimbus JOSE + JWT expose systems to denial of service attacks, with CVSS scores indicating significant availability impacts due to issues with deeply nested JSON objects.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53864 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53864.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-53864"
},
{
"cve": "CVE-2025-54090",
"cwe": {
"id": "CWE-253",
"name": "Incorrect Check of Function Return Value"
},
"notes": [
{
"category": "other",
"text": "Incorrect Check of Function Return Value",
"title": "CWE-253"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core Automated Test Suite and Apache HTTP Server 2.4.64 expose systems to unauthorized data access and potential denial of service, with a CVSS score of 6.3 for the Oracle issue.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-54090 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-54090.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-54090"
},
{
"cve": "CVE-2025-55163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Recent updates to Netty address critical vulnerabilities, including the \u0027MadeYouReset\u0027 DDoS attack in HTTP/2, which can lead to denial of service through resource exhaustion in various affected versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55163 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55163.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-55163"
},
{
"cve": "CVE-2025-57803",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "ImageMagick has addressed critical vulnerabilities in its BMP encoder, including a 32-bit integer overflow leading to heap corruption and potential code execution, alongside other security enhancements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-57803 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-57803.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-57803"
},
{
"cve": "CVE-2025-58057",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Highly Compressed Data (Data Amplification)",
"title": "CWE-409"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Multiple vulnerabilities in decompressing decoders, including `BrotliDecoder`, and components of Oracle and HPE products can lead to denial of service through excessive buffer allocation and malformed HTTP/2 frames.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-58057 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58057.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-58057"
},
{
"cve": "CVE-2025-59375",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "A memory amplification vulnerability in libexpat (CVE-2025-59375) allows excessive memory allocations from crafted XML input, affecting versions prior to 2.7.2, while a Security-in-Depth issue exists in Oracle Database Server\u0027s Perl component but is not exploitable.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-59375 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59375.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-59375"
}
]
}
ghsa-h46c-h94j-95f3
Vulnerability from github
Impact
With older versions of jackson-core, if you parse an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large.
Patches
jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. Change is in https://github.com/FasterXML/jackson-core/pull/943. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs.
Workarounds
Users should avoid parsing input files from untrusted sources.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "com.fasterxml.jackson.core:jackson-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.15.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-52999"
],
"database_specific": {
"cwe_ids": [
"CWE-121"
],
"github_reviewed": true,
"github_reviewed_at": "2025-06-27T15:22:22Z",
"nvd_published_at": "2025-06-25T17:15:39Z",
"severity": "HIGH"
},
"details": "### Impact\nWith older versions of jackson-core, if you parse an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large.\n\n### Patches\njackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. Change is in https://github.com/FasterXML/jackson-core/pull/943. jackson-core will throw a StreamConstraintsException if the limit is reached.\njackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs.\n\n### Workarounds\nUsers should avoid parsing input files from untrusted sources.",
"id": "GHSA-h46c-h94j-95f3",
"modified": "2025-06-27T15:22:22Z",
"published": "2025-06-27T15:22:22Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"type": "WEB",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"type": "PACKAGE",
"url": "https://github.com/FasterXML/jackson-core"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "jackson-core can throw a StackoverflowError when processing deeply nested data"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.