Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-4213 (GCVE-0-2021-4213)
Vulnerability from cvelistv5 – Published: 2022-08-24 15:07 – Updated: 2024-08-03 17:16
VLAI?
EPSS
Summary
A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server’s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.
Severity ?
No CVSS data available.
CWE
- CWE-401 - - Missing Release of Memory after Effective Lifetime
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:16:04.486Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://access.redhat.com/security/cve/CVE-2021-4213"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2021-4213"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "JSS",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Fixed in v5.2.0-beta1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server\u2019s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-401",
"description": "CWE-401 - Missing Release of Memory after Effective Lifetime",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-24T15:07:48",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://access.redhat.com/security/cve/CVE-2021-4213"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2021-4213"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2021-4213",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "JSS",
"version": {
"version_data": [
{
"version_value": "Fixed in v5.2.0-beta1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server\u2019s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-401 - Missing Release of Memory after Effective Lifetime"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900"
},
{
"name": "https://access.redhat.com/security/cve/CVE-2021-4213",
"refsource": "MISC",
"url": "https://access.redhat.com/security/cve/CVE-2021-4213"
},
{
"name": "https://security-tracker.debian.org/tracker/CVE-2021-4213",
"refsource": "MISC",
"url": "https://security-tracker.debian.org/tracker/CVE-2021-4213"
},
{
"name": "https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448",
"refsource": "MISC",
"url": "https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448"
},
{
"name": "https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2",
"refsource": "MISC",
"url": "https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2021-4213",
"datePublished": "2022-08-24T15:07:48",
"dateReserved": "2022-01-25T00:00:00",
"dateUpdated": "2024-08-03T17:16:04.486Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dogtagpki:network_security_services_for_java:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.9.3\", \"matchCriteriaId\": \"FE906ED1-3382-4027-81C4-4572B2E27BC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dogtagpki:network_security_services_for_java:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.0.0\", \"versionEndExcluding\": \"5.1.0\", \"matchCriteriaId\": \"AC95A8E0-BC9C-495E-B675-A2ECD52CC984\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server\\u2019s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.\"}, {\"lang\": \"es\", \"value\": \"Se ha encontrado un fallo en JSS, que no libera apropiadamente toda la memoria. Con el tiempo, la memoria desperdiciada es acumulada en la memoria del servidor, saturando la RAM del mismo. Este fallo permite a un atacante forzar la invocaci\\u00f3n de un proceso fuera de memoria, causando una denegaci\\u00f3n de servicio.\"}]",
"id": "CVE-2021-4213",
"lastModified": "2024-11-21T06:37:09.933",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2022-08-24T16:15:09.980",
"references": "[{\"url\": \"https://access.redhat.com/security/cve/CVE-2021-4213\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2042900\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://security-tracker.debian.org/tracker/CVE-2021-4213\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2021-4213\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2042900\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://security-tracker.debian.org/tracker/CVE-2021-4213\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-401\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-401\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-4213\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2022-08-24T16:15:09.980\",\"lastModified\":\"2024-11-21T06:37:09.933\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server\u2019s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado un fallo en JSS, que no libera apropiadamente toda la memoria. Con el tiempo, la memoria desperdiciada es acumulada en la memoria del servidor, saturando la RAM del mismo. Este fallo permite a un atacante forzar la invocaci\u00f3n de un proceso fuera de memoria, causando una denegaci\u00f3n de servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dogtagpki:network_security_services_for_java:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.9.3\",\"matchCriteriaId\":\"FE906ED1-3382-4027-81C4-4572B2E27BC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dogtagpki:network_security_services_for_java:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.0.0\",\"versionEndExcluding\":\"5.1.0\",\"matchCriteriaId\":\"AC95A8E0-BC9C-495E-B675-A2ECD52CC984\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/security/cve/CVE-2021-4213\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2042900\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security-tracker.debian.org/tracker/CVE-2021-4213\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2021-4213\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2042900\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security-tracker.debian.org/tracker/CVE-2021-4213\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
GHSA-727R-5FR6-WJFP
Vulnerability from github – Published: 2022-08-25 00:00 – Updated: 2022-08-29 20:06
VLAI?
Details
A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server’s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.
Severity ?
7.5 (High)
{
"affected": [],
"aliases": [
"CVE-2021-4213"
],
"database_specific": {
"cwe_ids": [
"CWE-401"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-08-24T16:15:00Z",
"severity": "HIGH"
},
"details": "A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server\u2019s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.",
"id": "GHSA-727r-5fr6-wjfp",
"modified": "2022-08-29T20:06:54Z",
"published": "2022-08-25T00:00:27Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4213"
},
{
"type": "WEB",
"url": "https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2"
},
{
"type": "WEB",
"url": "https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2021-4213"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900"
},
{
"type": "WEB",
"url": "https://security-tracker.debian.org/tracker/CVE-2021-4213"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2024-0352
Vulnerability from csaf_certbund - Published: 2022-05-10 22:00 - Updated: 2024-02-12 23:00Summary
Red Hat Enterprise Linux (DogTag PKI): Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux in der PKI-Core Komponente ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux in der PKI-Core Komponente ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0352 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2024-0352.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0352 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0352"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2022-05-10",
"url": "https://access.redhat.com/errata/RHSA-2022:1851"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0774 vom 2024-02-12",
"url": "https://access.redhat.com/errata/RHSA-2024:0774"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux (DogTag PKI): Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2024-02-12T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T18:05:07.212+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2024-0352",
"initial_release_date": "2022-05-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-05-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-02-12T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "8",
"product": {
"name": "Red Hat Enterprise Linux 8",
"product_id": "T014111",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4213",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux in der PKI-Core Komponente (\"DogTag PKI\"). JSS gibt den Speicher, der bei einer TLS-Verbindung verwendet wird, nicht vollst\u00e4ndig frei. Ein Angreifer kann durch wiederholtes Aufbauen von TLS Verbindungen den Speicher verbrauchen und somit einen Denial of Service Zustand herbeif\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"T014111"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-4213"
}
]
}
RHSA-2024:0774
Vulnerability from csaf_redhat - Published: 2024-02-12 09:10 - Updated: 2025-11-21 18:54Summary
Red Hat Security Advisory: Red Hat Certificate System 10.4 for RHEL 8 security and bug fix update
Notes
Topic
An update is now available for Red Hat Certificate System 10.4 for RHEL 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link in the References section.
Details
Red Hat Certificate System (RHCS) is a complete implementation of an enterprise software system designed to manage enterprise Public Key Infrastructure (PKI) deployments.
Security fixes:
* JSS: memory leak in TLS connection leads to OOM (CVE-2021-4213)
* pki-core:10.6/jss: memory leak in TLS connection leads to OOM (CVE-2021-4213)
For more details about the security issues, refer to the link in the References section.
Bug fixes:
* no ROLE_ASSUME audit messages seen in TPS audit log (BZ#1549887)
* Unassign certificate enrollment request not working (BZ#1858702)
* Date Format on the TPS Agent Page (BZ#1984455)
* Directory authentication plugin requires directory admin password just for user authentication (BZ#2017505)
* Add SCEP AES support (BZ#2075363)
* JSS cannot be properly initialized after using another NSS-backed security provider (BZ#2087224)
* Empty subject field in CSR causes failure to certificate issuance (BZ#2105471)
* RA Separation by KeyType - Set Token Status (BZ#2106153)
* Disallowed "supported_groups" in TLS1.2 key exchange (BZ#2113782)
* Some unsusable profiles are present in CA's EE page (BZ#2118662)
* ClientIP and ServerIP are missing in ACCESS_SESSION_ESTABLISH/ACCESS_SESSION_TERMINATED Audit Event when PKI is acting as a Server (BZ#2122502)
* add AES support for TMS server-side keygen on latest HSM / FIPS environment (BZ#2123071)
* CA's Key Escrow is Failing Through httpd Reverse Proxy (BZ#2130250)
* Provide Enrollment over Secure Transport / EST interface to Dogtag / RFC 7030 to support SCEP over EST (BZ#2142893)
* DHE ciphers not working (dropping DHE ciphersuites) (BZ#2142903)
* pkiconsole unable to connect pki servers that's in fips mode with client cert (BZ#2142904)
* KRA and OCSP display banner prompts during pkispawn (BZ#2142905)
* missing audit event CLIENT_ACCESS_SESSION_ESTABLISH when CS instance acting as a client and fails to connect (BZ#2142906)
* EST prep work (BZ#2142907)
* add AES support for TMS Shared Secret on latest HSM / FIPS environment (BZ#2142908)
* CS instance when acting as a client does not observe the cipher list set in server.xml (BZ#2142909)
* OCSP using AIA extension fails (BZ#2144080)
* Lightweight CA: Add support for multiple sub-CAs underneath primary CA (BZ#2149115)
* TPS Not allowing Token Status Change based on Revoke True/False and Hold till last True/False (BZ#2166003)
* Unable to use the TPS UI "Token Filter" to filter a list of tokens (BZ#2179307)
* TPS Not allowing Token Status Change based on Revoke True/False and Hold till last True/False (part 2) (BZ#2181142)
* root CA signing cert should not have AIA extension (BZ#2182201)
* PrettyPrintCert does not properly translate AIA information into a readable format (BZ#2184930)
* OCSP AddCRLServlet "SEVERE...NOT SUPPORTED" log messages (BZ#2190283)
* PrettyPrintCert does not properly translate Subject Information Access information into a readable format (BZ#2209624)
* OCSP Responder not responding to certs issued by unknown CAs (BZ#2221818)
* pkispawn non-CA pki instance result in TLS client-authentication to its internaldb not finding pkidbuser by default (BZ#2228209)
* pkispawn externally signed sub CA clone with Thales Luna HSM fails: UNKNOWN_ISSUER (BZ#2228922)
* OCSP responder to serve status check for itself using latest CRL (BZ#2229930)
* RHCS Fails to Upgrade if Profile Does not exist (BZ#2230102)
* CLIENT_ACCESS_SESSION_* audit events contain wrong ServerPort (BZ#2233740)
* Server-side Key Generation Produces Certificates with Identical SKID (BZ#2246422)
* Generating Keys with no OpsFlagMask set - ThalesHSM integration (BZ#2251981)
* RootCA's OCSP fails to install with the SHA-2 subjectKeyIdentifier extension (BZ#2253044)
* Make key wrapping algorithm configurable between AES-KWP and AES-CBC (BZ#2253675)
* pkidestroy log keeps HSM token password (BZ#2253683)
Users of RHCS 10 are advised to upgrade to these updated packages.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Certificate System 10.4 for RHEL 8.\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Certificate System (RHCS) is a complete implementation of an enterprise software system designed to manage enterprise Public Key Infrastructure (PKI) deployments.\n\nSecurity fixes:\n\n* JSS: memory leak in TLS connection leads to OOM (CVE-2021-4213)\n\n* pki-core:10.6/jss: memory leak in TLS connection leads to OOM (CVE-2021-4213)\n\nFor more details about the security issues, refer to the link in the References section.\n\nBug fixes:\n\n* no ROLE_ASSUME audit messages seen in TPS audit log (BZ#1549887)\n\n* Unassign certificate enrollment request not working (BZ#1858702)\n\n* Date Format on the TPS Agent Page (BZ#1984455)\n\n* Directory authentication plugin requires directory admin password just for user authentication (BZ#2017505) \n\n* Add SCEP AES support (BZ#2075363)\n\n* JSS cannot be properly initialized after using another NSS-backed security provider (BZ#2087224) \n\n* Empty subject field in CSR causes failure to certificate issuance (BZ#2105471)\n\n* RA Separation by KeyType - Set Token Status (BZ#2106153)\n\n* Disallowed \"supported_groups\" in TLS1.2 key exchange (BZ#2113782)\n\n* Some unsusable profiles are present in CA\u0027s EE page (BZ#2118662)\n\n* ClientIP and ServerIP are missing in ACCESS_SESSION_ESTABLISH/ACCESS_SESSION_TERMINATED Audit Event when PKI is acting as a Server (BZ#2122502)\n\n* add AES support for TMS server-side keygen on latest HSM / FIPS environment (BZ#2123071)\n\n* CA\u0027s Key Escrow is Failing Through httpd Reverse Proxy (BZ#2130250)\n\n* Provide Enrollment over Secure Transport / EST interface to Dogtag / RFC 7030 to support SCEP over EST (BZ#2142893)\n\n* DHE ciphers not working (dropping DHE ciphersuites) (BZ#2142903) \n\n* pkiconsole unable to connect pki servers that\u0027s in fips mode with client cert (BZ#2142904)\n\n* KRA and OCSP display banner prompts during pkispawn (BZ#2142905) \n\n* missing audit event CLIENT_ACCESS_SESSION_ESTABLISH when CS instance acting as a client and fails to connect (BZ#2142906)\n\n* EST prep work (BZ#2142907)\n\n* add AES support for TMS Shared Secret on latest HSM / FIPS environment (BZ#2142908)\n\n* CS instance when acting as a client does not observe the cipher list set in server.xml (BZ#2142909) \n\n* OCSP using AIA extension fails (BZ#2144080)\n\n* Lightweight CA: Add support for multiple sub-CAs underneath primary CA (BZ#2149115) \n\n* TPS Not allowing Token Status Change based on Revoke True/False and Hold till last True/False (BZ#2166003)\n\n* Unable to use the TPS UI \"Token Filter\" to filter a list of tokens (BZ#2179307)\n\n* TPS Not allowing Token Status Change based on Revoke True/False and Hold till last True/False (part 2) (BZ#2181142)\n\n* root CA signing cert should not have AIA extension (BZ#2182201)\n\n* PrettyPrintCert does not properly translate AIA information into a readable format (BZ#2184930)\n\n* OCSP AddCRLServlet \"SEVERE...NOT SUPPORTED\" log messages (BZ#2190283)\n\n* PrettyPrintCert does not properly translate Subject Information Access information into a readable format (BZ#2209624)\n\n* OCSP Responder not responding to certs issued by unknown CAs (BZ#2221818)\n\n* pkispawn non-CA pki instance result in TLS client-authentication to its internaldb not finding pkidbuser by default (BZ#2228209)\n\n* pkispawn externally signed sub CA clone with Thales Luna HSM fails: UNKNOWN_ISSUER (BZ#2228922)\n\n* OCSP responder to serve status check for itself using latest CRL (BZ#2229930)\n\n* RHCS Fails to Upgrade if Profile Does not exist (BZ#2230102)\n\n* CLIENT_ACCESS_SESSION_* audit events contain wrong ServerPort (BZ#2233740)\n\n* Server-side Key Generation Produces Certificates with Identical SKID (BZ#2246422)\n\n* Generating Keys with no OpsFlagMask set - ThalesHSM integration (BZ#2251981)\n\n* RootCA\u0027s OCSP fails to install with the SHA-2 subjectKeyIdentifier extension (BZ#2253044)\n\n* Make key wrapping algorithm configurable between AES-KWP and AES-CBC (BZ#2253675)\n\n* pkidestroy log keeps HSM token password (BZ#2253683)\n\nUsers of RHCS 10 are advised to upgrade to these updated packages.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0774",
"url": "https://access.redhat.com/errata/RHSA-2024:0774"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2042900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0774.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Certificate System 10.4 for RHEL 8 security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:54:05+00:00",
"generator": {
"date": "2025-11-21T18:54:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:0774",
"initial_release_date": "2024-02-12T09:10:53+00:00",
"revision_history": [
{
"date": "2024-02-12T09:10:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-02-12T09:10:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:54:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Certificate System 10.4 for RHEL 8",
"product": {
"name": "Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:certificate_system:10.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Certificate System"
},
{
"branches": [
{
"category": "product_version",
"name": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"product": {
"name": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.noarch (redhat-pki:10)",
"product_id": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/idm-console-framework@1.3.0-1.module%2Bel8pki%2B14677%2B1ef79a68?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"product": {
"name": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch (redhat-pki:10)",
"product_id": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ldapjdk@4.23.0-1.module%2Bel8pki%2B14677%2B1ef79a68?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "ldapjdk-javadoc-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"product": {
"name": "ldapjdk-javadoc-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch (redhat-pki:10)",
"product_id": "ldapjdk-javadoc-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ldapjdk-javadoc@4.23.0-1.module%2Bel8pki%2B14677%2B1ef79a68?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "python3-redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product": {
"name": "python3-redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10)",
"product_id": "python3-redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-redhat-pki@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-acme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product": {
"name": "redhat-pki-acme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10)",
"product_id": "redhat-pki-acme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-acme@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-base-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product": {
"name": "redhat-pki-base-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10)",
"product_id": "redhat-pki-base-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-base@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-base-java-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product": {
"name": "redhat-pki-base-java-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10)",
"product_id": "redhat-pki-base-java-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-base-java@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-ca-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product": {
"name": "redhat-pki-ca-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10)",
"product_id": "redhat-pki-ca-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-ca@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-console-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product": {
"name": "redhat-pki-console-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10)",
"product_id": "redhat-pki-console-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-console@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-console-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product": {
"name": "redhat-pki-console-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10)",
"product_id": "redhat-pki-console-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-console-theme@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-est-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product": {
"name": "redhat-pki-est-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10)",
"product_id": "redhat-pki-est-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-est@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-javadoc-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product": {
"name": "redhat-pki-javadoc-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10)",
"product_id": "redhat-pki-javadoc-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-javadoc@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-kra-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product": {
"name": "redhat-pki-kra-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10)",
"product_id": "redhat-pki-kra-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-kra@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-ocsp-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product": {
"name": "redhat-pki-ocsp-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10)",
"product_id": "redhat-pki-ocsp-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-ocsp@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-server-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product": {
"name": "redhat-pki-server-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10)",
"product_id": "redhat-pki-server-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-server@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-server-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product": {
"name": "redhat-pki-server-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10)",
"product_id": "redhat-pki-server-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-server-theme@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-tks-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product": {
"name": "redhat-pki-tks-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10)",
"product_id": "redhat-pki-tks-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-tks@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.noarch::redhat-pki:10",
"product": {
"name": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.noarch (redhat-pki:10)",
"product_id": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.noarch::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcatjss@7.7.3-1.module%2Bel8pki%2B19895%2Bc800dfbd?arch=noarch\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.src::redhat-pki:10",
"product": {
"name": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.src (redhat-pki:10)",
"product_id": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.src::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/idm-console-framework@1.3.0-1.module%2Bel8pki%2B14677%2B1ef79a68?arch=src\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src::redhat-pki:10",
"product": {
"name": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src (redhat-pki:10)",
"product_id": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss@4.9.8-1.module%2Bel8pki%2B19895%2Bc800dfbd?arch=src\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.src::redhat-pki:10",
"product": {
"name": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.src (redhat-pki:10)",
"product_id": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.src::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ldapjdk@4.23.0-1.module%2Bel8pki%2B14677%2B1ef79a68?arch=src\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.src::redhat-pki:10",
"product": {
"name": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.src (redhat-pki:10)",
"product_id": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.src::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=src\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.src::redhat-pki:10",
"product": {
"name": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.src (redhat-pki:10)",
"product_id": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.src::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcatjss@7.7.3-1.module%2Bel8pki%2B19895%2Bc800dfbd?arch=src\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"product": {
"name": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64 (redhat-pki:10)",
"product_id": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss@4.9.8-1.module%2Bel8pki%2B19895%2Bc800dfbd?arch=x86_64\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "jss-debuginfo-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"product": {
"name": "jss-debuginfo-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64 (redhat-pki:10)",
"product_id": "jss-debuginfo-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debuginfo@4.9.8-1.module%2Bel8pki%2B19895%2Bc800dfbd?arch=x86_64\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "jss-debugsource-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"product": {
"name": "jss-debugsource-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64 (redhat-pki:10)",
"product_id": "jss-debugsource-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debugsource@4.9.8-1.module%2Bel8pki%2B19895%2Bc800dfbd?arch=x86_64\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "jss-javadoc-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"product": {
"name": "jss-javadoc-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64 (redhat-pki:10)",
"product_id": "jss-javadoc-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-javadoc@4.9.8-1.module%2Bel8pki%2B19895%2Bc800dfbd?arch=x86_64\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product": {
"name": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10)",
"product_id": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product": {
"name": "redhat-pki-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10)",
"product_id": "redhat-pki-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-debuginfo@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-debugsource-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product": {
"name": "redhat-pki-debugsource-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10)",
"product_id": "redhat-pki-debugsource-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-debugsource@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-symkey-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product": {
"name": "redhat-pki-symkey-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10)",
"product_id": "redhat-pki-symkey-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-symkey@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-symkey-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product": {
"name": "redhat-pki-symkey-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10)",
"product_id": "redhat-pki-symkey-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-symkey-debuginfo@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-tools-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product": {
"name": "redhat-pki-tools-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10)",
"product_id": "redhat-pki-tools-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-tools@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-tools-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product": {
"name": "redhat-pki-tools-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10)",
"product_id": "redhat-pki-tools-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-tools-debuginfo@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-tps-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product": {
"name": "redhat-pki-tps-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10)",
"product_id": "redhat-pki-tps-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-tps@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-tps-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product": {
"name": "redhat-pki-tps-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10)",
"product_id": "redhat-pki-tps-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-tps-debuginfo@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64\u0026rpmmod=redhat-pki:10:8060020231220182310:07fb4edf"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10"
},
"product_reference": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.src (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.src::redhat-pki:10"
},
"product_reference": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.src::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src::redhat-pki:10"
},
"product_reference": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64 (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10"
},
"product_reference": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debuginfo-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64 (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:jss-debuginfo-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10"
},
"product_reference": "jss-debuginfo-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debugsource-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64 (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:jss-debugsource-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10"
},
"product_reference": "jss-debugsource-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-javadoc-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64 (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:jss-javadoc-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10"
},
"product_reference": "jss-javadoc-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10"
},
"product_reference": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.src (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.src::redhat-pki:10"
},
"product_reference": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.src::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ldapjdk-javadoc-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:ldapjdk-javadoc-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10"
},
"product_reference": "ldapjdk-javadoc-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:python3-redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10"
},
"product_reference": "python3-redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.src (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.src::redhat-pki:10"
},
"product_reference": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.src::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10"
},
"product_reference": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-acme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-acme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10"
},
"product_reference": "redhat-pki-acme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-base-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-base-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10"
},
"product_reference": "redhat-pki-base-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-base-java-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-base-java-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10"
},
"product_reference": "redhat-pki-base-java-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-ca-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-ca-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10"
},
"product_reference": "redhat-pki-ca-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-console-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-console-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10"
},
"product_reference": "redhat-pki-console-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-console-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-console-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10"
},
"product_reference": "redhat-pki-console-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10"
},
"product_reference": "redhat-pki-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-debugsource-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-debugsource-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10"
},
"product_reference": "redhat-pki-debugsource-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-est-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-est-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10"
},
"product_reference": "redhat-pki-est-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-javadoc-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-javadoc-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10"
},
"product_reference": "redhat-pki-javadoc-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-kra-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-kra-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10"
},
"product_reference": "redhat-pki-kra-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-ocsp-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-ocsp-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10"
},
"product_reference": "redhat-pki-ocsp-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-server-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-server-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10"
},
"product_reference": "redhat-pki-server-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-server-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-server-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10"
},
"product_reference": "redhat-pki-server-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-symkey-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-symkey-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10"
},
"product_reference": "redhat-pki-symkey-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-symkey-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-symkey-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10"
},
"product_reference": "redhat-pki-symkey-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-tks-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-tks-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10"
},
"product_reference": "redhat-pki-tks-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-tools-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-tools-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10"
},
"product_reference": "redhat-pki-tools-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-tools-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-tools-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10"
},
"product_reference": "redhat-pki-tools-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-tps-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-tps-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10"
},
"product_reference": "redhat-pki-tps-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-tps-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki-tps-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10"
},
"product_reference": "redhat-pki-tps-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.noarch (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.noarch::redhat-pki:10"
},
"product_reference": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.noarch::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.src (redhat-pki:10) as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.src::redhat-pki:10"
},
"product_reference": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.src::redhat-pki:10",
"relates_to_product_reference": "8Base-CertSys-10.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4213",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2022-01-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CertSys-10.4:idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"8Base-CertSys-10.4:idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.src::redhat-pki:10",
"8Base-CertSys-10.4:jss-debuginfo-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:jss-debugsource-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:jss-javadoc-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"8Base-CertSys-10.4:ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.src::redhat-pki:10",
"8Base-CertSys-10.4:ldapjdk-javadoc-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"8Base-CertSys-10.4:python3-redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.src::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-acme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-base-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-base-java-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-ca-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-console-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-console-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-debugsource-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-est-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-javadoc-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-kra-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-ocsp-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-server-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-server-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-symkey-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-symkey-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-tks-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-tools-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-tools-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-tps-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-tps-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.noarch::redhat-pki:10",
"8Base-CertSys-10.4:tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.src::redhat-pki:10"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042900"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server\u2019s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JSS: memory leak in TLS connection leads to OOM",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CertSys-10.4:jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src::redhat-pki:10",
"8Base-CertSys-10.4:jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10"
],
"known_not_affected": [
"8Base-CertSys-10.4:idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"8Base-CertSys-10.4:idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.src::redhat-pki:10",
"8Base-CertSys-10.4:jss-debuginfo-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:jss-debugsource-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:jss-javadoc-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"8Base-CertSys-10.4:ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.src::redhat-pki:10",
"8Base-CertSys-10.4:ldapjdk-javadoc-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"8Base-CertSys-10.4:python3-redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.src::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-acme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-base-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-base-java-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-ca-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-console-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-console-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-debugsource-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-est-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-javadoc-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-kra-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-ocsp-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-server-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-server-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-symkey-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-symkey-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-tks-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-tools-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-tools-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-tps-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-tps-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.noarch::redhat-pki:10",
"8Base-CertSys-10.4:tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.src::redhat-pki:10"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4213"
},
{
"category": "external",
"summary": "RHBZ#2042900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4213"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-02-12T09:10:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CertSys-10.4:jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src::redhat-pki:10",
"8Base-CertSys-10.4:jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0774"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CertSys-10.4:idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"8Base-CertSys-10.4:idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.src::redhat-pki:10",
"8Base-CertSys-10.4:jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src::redhat-pki:10",
"8Base-CertSys-10.4:jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:jss-debuginfo-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:jss-debugsource-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:jss-javadoc-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"8Base-CertSys-10.4:ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.src::redhat-pki:10",
"8Base-CertSys-10.4:ldapjdk-javadoc-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch::redhat-pki:10",
"8Base-CertSys-10.4:python3-redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.src::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-acme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-base-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-base-java-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-ca-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-console-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-console-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-debugsource-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-est-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-javadoc-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-kra-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-ocsp-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-server-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-server-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-symkey-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-symkey-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-tks-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-tools-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-tools-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-tps-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:redhat-pki-tps-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64::redhat-pki:10",
"8Base-CertSys-10.4:tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.noarch::redhat-pki:10",
"8Base-CertSys-10.4:tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.src::redhat-pki:10"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JSS: memory leak in TLS connection leads to OOM"
}
]
}
RHSA-2022_1851
Vulnerability from csaf_redhat - Published: 2022-05-10 13:43 - Updated: 2024-11-22 17:53Summary
Red Hat Security Advisory: pki-core:10.6 security and bug fix update
Notes
Topic
An update for the pki-core:10.6 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.
Security Fix(es):
* JSS: memory leak in TLS connection leads to OOM (CVE-2021-4213)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the pki-core:10.6 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* JSS: memory leak in TLS connection leads to OOM (CVE-2021-4213)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1851",
"url": "https://access.redhat.com/errata/RHSA-2022:1851"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/"
},
{
"category": "external",
"summary": "1904112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904112"
},
{
"category": "external",
"summary": "1980378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980378"
},
{
"category": "external",
"summary": "2004084",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004084"
},
{
"category": "external",
"summary": "2006070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006070"
},
{
"category": "external",
"summary": "2019200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019200"
},
{
"category": "external",
"summary": "2027470",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027470"
},
{
"category": "external",
"summary": "2042900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1851.json"
}
],
"title": "Red Hat Security Advisory: pki-core:10.6 security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T17:53:38+00:00",
"generator": {
"date": "2024-11-22T17:53:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:1851",
"initial_release_date": "2022-05-10T13:43:23+00:00",
"revision_history": [
{
"date": "2022-05-10T13:43:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-10T13:43:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T17:53:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "pki-core:10.6:8060020220215143656:7e0b02f6",
"product": {
"name": "pki-core:10.6:8060020220215143656:7e0b02f6",
"product_id": "pki-core:10.6:8060020220215143656:7e0b02f6",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/pki-core@10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch",
"product": {
"name": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch",
"product_id": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ldapjdk@4.23.0-1.module%2Bel8.5.0%2B11983%2B6ba118b4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch",
"product": {
"name": "ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch",
"product_id": "ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ldapjdk-javadoc@4.23.0-1.module%2Bel8.5.0%2B11983%2B6ba118b4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product": {
"name": "pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product_id": "pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-acme@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product": {
"name": "pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product_id": "pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-base@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product": {
"name": "pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product_id": "pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-base-java@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product": {
"name": "pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product_id": "pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-ca@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product": {
"name": "pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product_id": "pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-kra@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product": {
"name": "pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product_id": "pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-server@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product": {
"name": "python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product_id": "python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-pki@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch",
"product": {
"name": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch",
"product_id": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcatjss@7.7.1-1.module%2Bel8.6.0%2B13291%2B248751b1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"product": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"product_id": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"product": {
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"product_id": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debuginfo@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"product": {
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"product_id": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debugsource@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"product": {
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"product_id": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-javadoc@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product": {
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product_id": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product": {
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product_id": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core-debugsource@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product": {
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product_id": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-symkey@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product": {
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product_id": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-symkey-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product": {
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product_id": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-tools@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product": {
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product_id": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-tools-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src",
"product": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src",
"product_id": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=src"
}
}
},
{
"category": "product_version",
"name": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src",
"product": {
"name": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src",
"product_id": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ldapjdk@4.23.0-1.module%2Bel8.5.0%2B11983%2B6ba118b4?arch=src"
}
}
},
{
"category": "product_version",
"name": "pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src",
"product": {
"name": "pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src",
"product_id": "pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src",
"product": {
"name": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src",
"product_id": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcatjss@7.7.1-1.module%2Bel8.6.0%2B13291%2B248751b1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"product": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"product_id": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"product": {
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"product_id": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debuginfo@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"product": {
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"product_id": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debugsource@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"product": {
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"product_id": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-javadoc@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product": {
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product_id": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product": {
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product_id": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core-debugsource@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product": {
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product_id": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-symkey@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product": {
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product_id": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-symkey-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product": {
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product_id": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-tools@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product": {
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product_id": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-tools-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"product": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"product_id": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"product": {
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"product_id": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debuginfo@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"product": {
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"product_id": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debugsource@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"product": {
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"product_id": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-javadoc@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product": {
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product_id": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product": {
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product_id": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core-debugsource@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product": {
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product_id": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-symkey@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product": {
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product_id": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-symkey-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product": {
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product_id": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-tools@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product": {
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product_id": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-tools-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"product": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"product_id": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"product": {
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"product_id": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debuginfo@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"product": {
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"product_id": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debugsource@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"product": {
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"product_id": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-javadoc@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product": {
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product_id": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product": {
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product_id": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core-debugsource@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product": {
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product_id": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-symkey@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product": {
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product_id": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-symkey-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product": {
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product_id": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-tools@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product": {
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product_id": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-tools-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
"product_reference": "pki-core:10.6:8060020220215143656:7e0b02f6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64"
},
"product_reference": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le"
},
"product_reference": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x"
},
"product_reference": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src"
},
"product_reference": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64"
},
"product_reference": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64"
},
"product_reference": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le"
},
"product_reference": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x"
},
"product_reference": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64"
},
"product_reference": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64"
},
"product_reference": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le"
},
"product_reference": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x"
},
"product_reference": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64"
},
"product_reference": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64"
},
"product_reference": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le"
},
"product_reference": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x"
},
"product_reference": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64"
},
"product_reference": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch"
},
"product_reference": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src"
},
"product_reference": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch"
},
"product_reference": "ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch"
},
"product_reference": "pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch"
},
"product_reference": "pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch"
},
"product_reference": "pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch"
},
"product_reference": "pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src"
},
"product_reference": "pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64"
},
"product_reference": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le"
},
"product_reference": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x"
},
"product_reference": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64"
},
"product_reference": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64"
},
"product_reference": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le"
},
"product_reference": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x"
},
"product_reference": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64"
},
"product_reference": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch"
},
"product_reference": "pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch"
},
"product_reference": "pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64"
},
"product_reference": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le"
},
"product_reference": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x"
},
"product_reference": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64"
},
"product_reference": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64"
},
"product_reference": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le"
},
"product_reference": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x"
},
"product_reference": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64"
},
"product_reference": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64"
},
"product_reference": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le"
},
"product_reference": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x"
},
"product_reference": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64"
},
"product_reference": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64"
},
"product_reference": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le"
},
"product_reference": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x"
},
"product_reference": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64"
},
"product_reference": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch"
},
"product_reference": "python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch"
},
"product_reference": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src as a component of pki-core:10.6:8060020220215143656:7e0b02f6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src"
},
"product_reference": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src",
"relates_to_product_reference": "AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4213",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2022-01-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042900"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server\u2019s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JSS: memory leak in TLS connection leads to OOM",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4213"
},
{
"category": "external",
"summary": "RHBZ#2042900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4213"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1851"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch",
"AppStream-8.6.0.GA:pki-core:10.6:8060020220215143656:7e0b02f6:tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JSS: memory leak in TLS connection leads to OOM"
}
]
}
RHSA-2022:1851
Vulnerability from csaf_redhat - Published: 2022-05-10 13:43 - Updated: 2025-11-21 18:30Summary
Red Hat Security Advisory: pki-core:10.6 security and bug fix update
Notes
Topic
An update for the pki-core:10.6 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.
Security Fix(es):
* JSS: memory leak in TLS connection leads to OOM (CVE-2021-4213)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the pki-core:10.6 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* JSS: memory leak in TLS connection leads to OOM (CVE-2021-4213)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1851",
"url": "https://access.redhat.com/errata/RHSA-2022:1851"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/"
},
{
"category": "external",
"summary": "1904112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904112"
},
{
"category": "external",
"summary": "1980378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980378"
},
{
"category": "external",
"summary": "2004084",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004084"
},
{
"category": "external",
"summary": "2006070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006070"
},
{
"category": "external",
"summary": "2019200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019200"
},
{
"category": "external",
"summary": "2027470",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027470"
},
{
"category": "external",
"summary": "2042900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1851.json"
}
],
"title": "Red Hat Security Advisory: pki-core:10.6 security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:30:33+00:00",
"generator": {
"date": "2025-11-21T18:30:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2022:1851",
"initial_release_date": "2022-05-10T13:43:23+00:00",
"revision_history": [
{
"date": "2022-05-10T13:43:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-10T13:43:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:30:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"product": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64 (pki-core:10.6)",
"product_id": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=aarch64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"product": {
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64 (pki-core:10.6)",
"product_id": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debuginfo@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=aarch64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"product": {
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64 (pki-core:10.6)",
"product_id": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debugsource@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=aarch64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"product": {
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64 (pki-core:10.6)",
"product_id": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-javadoc@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=aarch64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"product": {
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 (pki-core:10.6)",
"product_id": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=aarch64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"product": {
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 (pki-core:10.6)",
"product_id": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core-debugsource@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=aarch64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"product": {
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 (pki-core:10.6)",
"product_id": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-symkey@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=aarch64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"product": {
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 (pki-core:10.6)",
"product_id": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-symkey-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=aarch64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"product": {
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 (pki-core:10.6)",
"product_id": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-tools@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=aarch64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"product": {
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 (pki-core:10.6)",
"product_id": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-tools-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=aarch64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src::pki-core:10.6",
"product": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src (pki-core:10.6)",
"product_id": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=src\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src::pki-core:10.6",
"product": {
"name": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src (pki-core:10.6)",
"product_id": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ldapjdk@4.23.0-1.module%2Bel8.5.0%2B11983%2B6ba118b4?arch=src\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src::pki-core:10.6",
"product": {
"name": "pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src (pki-core:10.6)",
"product_id": "pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=src\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src::pki-core:10.6",
"product": {
"name": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src (pki-core:10.6)",
"product_id": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcatjss@7.7.1-1.module%2Bel8.6.0%2B13291%2B248751b1?arch=src\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch::pki-core:10.6",
"product": {
"name": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch (pki-core:10.6)",
"product_id": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ldapjdk@4.23.0-1.module%2Bel8.5.0%2B11983%2B6ba118b4?arch=noarch\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch::pki-core:10.6",
"product": {
"name": "ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch (pki-core:10.6)",
"product_id": "ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ldapjdk-javadoc@4.23.0-1.module%2Bel8.5.0%2B11983%2B6ba118b4?arch=noarch\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"product": {
"name": "pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch (pki-core:10.6)",
"product_id": "pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-acme@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=noarch\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"product": {
"name": "pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch (pki-core:10.6)",
"product_id": "pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-base@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=noarch\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"product": {
"name": "pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch (pki-core:10.6)",
"product_id": "pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-base-java@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=noarch\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"product": {
"name": "pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch (pki-core:10.6)",
"product_id": "pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-ca@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=noarch\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"product": {
"name": "pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch (pki-core:10.6)",
"product_id": "pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-kra@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=noarch\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"product": {
"name": "pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch (pki-core:10.6)",
"product_id": "pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-server@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=noarch\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"product": {
"name": "python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch (pki-core:10.6)",
"product_id": "python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-pki@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=noarch\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch::pki-core:10.6",
"product": {
"name": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch (pki-core:10.6)",
"product_id": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcatjss@7.7.1-1.module%2Bel8.6.0%2B13291%2B248751b1?arch=noarch\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"product": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le (pki-core:10.6)",
"product_id": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=ppc64le\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"product": {
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le (pki-core:10.6)",
"product_id": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debuginfo@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=ppc64le\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"product": {
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le (pki-core:10.6)",
"product_id": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debugsource@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=ppc64le\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"product": {
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le (pki-core:10.6)",
"product_id": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-javadoc@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=ppc64le\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"product": {
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le (pki-core:10.6)",
"product_id": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=ppc64le\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"product": {
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le (pki-core:10.6)",
"product_id": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core-debugsource@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=ppc64le\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"product": {
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le (pki-core:10.6)",
"product_id": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-symkey@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=ppc64le\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"product": {
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le (pki-core:10.6)",
"product_id": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-symkey-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=ppc64le\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"product": {
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le (pki-core:10.6)",
"product_id": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-tools@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=ppc64le\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"product": {
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le (pki-core:10.6)",
"product_id": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-tools-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=ppc64le\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"product": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x (pki-core:10.6)",
"product_id": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=s390x\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"product": {
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x (pki-core:10.6)",
"product_id": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debuginfo@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=s390x\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"product": {
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x (pki-core:10.6)",
"product_id": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debugsource@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=s390x\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"product": {
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x (pki-core:10.6)",
"product_id": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-javadoc@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=s390x\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"product": {
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x (pki-core:10.6)",
"product_id": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=s390x\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"product": {
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x (pki-core:10.6)",
"product_id": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core-debugsource@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=s390x\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"product": {
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x (pki-core:10.6)",
"product_id": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-symkey@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=s390x\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"product": {
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x (pki-core:10.6)",
"product_id": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-symkey-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=s390x\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"product": {
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x (pki-core:10.6)",
"product_id": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-tools@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=s390x\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"product": {
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x (pki-core:10.6)",
"product_id": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-tools-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=s390x\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"product": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64 (pki-core:10.6)",
"product_id": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=x86_64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"product": {
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64 (pki-core:10.6)",
"product_id": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debuginfo@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=x86_64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"product": {
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64 (pki-core:10.6)",
"product_id": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debugsource@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=x86_64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"product": {
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64 (pki-core:10.6)",
"product_id": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-javadoc@4.9.3-1.module%2Bel8.6.0%2B14244%2B60d461b7?arch=x86_64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"product": {
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 (pki-core:10.6)",
"product_id": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=x86_64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"product": {
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 (pki-core:10.6)",
"product_id": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-core-debugsource@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=x86_64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"product": {
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 (pki-core:10.6)",
"product_id": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-symkey@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=x86_64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"product": {
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 (pki-core:10.6)",
"product_id": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-symkey-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=x86_64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"product": {
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 (pki-core:10.6)",
"product_id": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-tools@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=x86_64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
},
{
"category": "product_version",
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"product": {
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 (pki-core:10.6)",
"product_id": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-tools-debuginfo@10.12.0-2.module%2Bel8.6.0%2B14115%2B8b467244?arch=x86_64\u0026rpmmod=pki-core:10.6:8060020220215143656:7e0b02f6"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6"
},
"product_reference": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6"
},
"product_reference": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6"
},
"product_reference": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src::pki-core:10.6"
},
"product_reference": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6"
},
"product_reference": "jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6"
},
"product_reference": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6"
},
"product_reference": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6"
},
"product_reference": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6"
},
"product_reference": "jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6"
},
"product_reference": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6"
},
"product_reference": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6"
},
"product_reference": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6"
},
"product_reference": "jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6"
},
"product_reference": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6"
},
"product_reference": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6"
},
"product_reference": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6"
},
"product_reference": "jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch::pki-core:10.6"
},
"product_reference": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src::pki-core:10.6"
},
"product_reference": "ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch::pki-core:10.6"
},
"product_reference": "ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6"
},
"product_reference": "pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6"
},
"product_reference": "pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6"
},
"product_reference": "pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6"
},
"product_reference": "pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src::pki-core:10.6"
},
"product_reference": "pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6"
},
"product_reference": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6"
},
"product_reference": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6"
},
"product_reference": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6"
},
"product_reference": "pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6"
},
"product_reference": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6"
},
"product_reference": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6"
},
"product_reference": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6"
},
"product_reference": "pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6"
},
"product_reference": "pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6"
},
"product_reference": "pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6"
},
"product_reference": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6"
},
"product_reference": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6"
},
"product_reference": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6"
},
"product_reference": "pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6"
},
"product_reference": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6"
},
"product_reference": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6"
},
"product_reference": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6"
},
"product_reference": "pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6"
},
"product_reference": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6"
},
"product_reference": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6"
},
"product_reference": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6"
},
"product_reference": "pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6"
},
"product_reference": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6"
},
"product_reference": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6"
},
"product_reference": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64 (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6"
},
"product_reference": "pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6"
},
"product_reference": "python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch::pki-core:10.6"
},
"product_reference": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src (pki-core:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src::pki-core:10.6"
},
"product_reference": "tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src::pki-core:10.6",
"relates_to_product_reference": "AppStream-8.6.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4213",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2022-01-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042900"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server\u2019s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JSS: memory leak in TLS connection leads to OOM",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src::pki-core:10.6",
"AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src::pki-core:10.6",
"AppStream-8.6.0.GA:ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src::pki-core:10.6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4213"
},
{
"category": "external",
"summary": "RHBZ#2042900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4213"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src::pki-core:10.6",
"AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src::pki-core:10.6",
"AppStream-8.6.0.GA:ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src::pki-core:10.6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1851"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.src::pki-core:10.6",
"AppStream-8.6.0.GA:jss-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debuginfo-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:jss-debugsource-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:jss-javadoc-0:4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:ldapjdk-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.src::pki-core:10.6",
"AppStream-8.6.0.GA:ldapjdk-javadoc-0:4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-acme-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-base-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-base-java-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-ca-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-0:10.12.0-2.module+el8.6.0+14115+8b467244.src::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-core-debugsource-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-kra-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-server-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-symkey-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.aarch64::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.ppc64le::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.s390x::pki-core:10.6",
"AppStream-8.6.0.GA:pki-tools-debuginfo-0:10.12.0-2.module+el8.6.0+14115+8b467244.x86_64::pki-core:10.6",
"AppStream-8.6.0.GA:python3-pki-0:10.12.0-2.module+el8.6.0+14115+8b467244.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.noarch::pki-core:10.6",
"AppStream-8.6.0.GA:tomcatjss-0:7.7.1-1.module+el8.6.0+13291+248751b1.src::pki-core:10.6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JSS: memory leak in TLS connection leads to OOM"
}
]
}
RHSA-2024_0774
Vulnerability from csaf_redhat - Published: 2024-02-12 09:10 - Updated: 2024-11-22 17:53Summary
Red Hat Security Advisory: Red Hat Certificate System 10.4 for RHEL 8 security and bug fix update
Notes
Topic
An update is now available for Red Hat Certificate System 10.4 for RHEL 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link in the References section.
Details
Red Hat Certificate System (RHCS) is a complete implementation of an enterprise software system designed to manage enterprise Public Key Infrastructure (PKI) deployments.
Security fixes:
* JSS: memory leak in TLS connection leads to OOM (CVE-2021-4213)
* pki-core:10.6/jss: memory leak in TLS connection leads to OOM (CVE-2021-4213)
For more details about the security issues, refer to the link in the References section.
Bug fixes:
* no ROLE_ASSUME audit messages seen in TPS audit log (BZ#1549887)
* Unassign certificate enrollment request not working (BZ#1858702)
* Date Format on the TPS Agent Page (BZ#1984455)
* Directory authentication plugin requires directory admin password just for user authentication (BZ#2017505)
* Add SCEP AES support (BZ#2075363)
* JSS cannot be properly initialized after using another NSS-backed security provider (BZ#2087224)
* Empty subject field in CSR causes failure to certificate issuance (BZ#2105471)
* RA Separation by KeyType - Set Token Status (BZ#2106153)
* Disallowed "supported_groups" in TLS1.2 key exchange (BZ#2113782)
* Some unsusable profiles are present in CA's EE page (BZ#2118662)
* ClientIP and ServerIP are missing in ACCESS_SESSION_ESTABLISH/ACCESS_SESSION_TERMINATED Audit Event when PKI is acting as a Server (BZ#2122502)
* add AES support for TMS server-side keygen on latest HSM / FIPS environment (BZ#2123071)
* CA's Key Escrow is Failing Through httpd Reverse Proxy (BZ#2130250)
* Provide Enrollment over Secure Transport / EST interface to Dogtag / RFC 7030 to support SCEP over EST (BZ#2142893)
* DHE ciphers not working (dropping DHE ciphersuites) (BZ#2142903)
* pkiconsole unable to connect pki servers that's in fips mode with client cert (BZ#2142904)
* KRA and OCSP display banner prompts during pkispawn (BZ#2142905)
* missing audit event CLIENT_ACCESS_SESSION_ESTABLISH when CS instance acting as a client and fails to connect (BZ#2142906)
* EST prep work (BZ#2142907)
* add AES support for TMS Shared Secret on latest HSM / FIPS environment (BZ#2142908)
* CS instance when acting as a client does not observe the cipher list set in server.xml (BZ#2142909)
* OCSP using AIA extension fails (BZ#2144080)
* Lightweight CA: Add support for multiple sub-CAs underneath primary CA (BZ#2149115)
* TPS Not allowing Token Status Change based on Revoke True/False and Hold till last True/False (BZ#2166003)
* Unable to use the TPS UI "Token Filter" to filter a list of tokens (BZ#2179307)
* TPS Not allowing Token Status Change based on Revoke True/False and Hold till last True/False (part 2) (BZ#2181142)
* root CA signing cert should not have AIA extension (BZ#2182201)
* PrettyPrintCert does not properly translate AIA information into a readable format (BZ#2184930)
* OCSP AddCRLServlet "SEVERE...NOT SUPPORTED" log messages (BZ#2190283)
* PrettyPrintCert does not properly translate Subject Information Access information into a readable format (BZ#2209624)
* OCSP Responder not responding to certs issued by unknown CAs (BZ#2221818)
* pkispawn non-CA pki instance result in TLS client-authentication to its internaldb not finding pkidbuser by default (BZ#2228209)
* pkispawn externally signed sub CA clone with Thales Luna HSM fails: UNKNOWN_ISSUER (BZ#2228922)
* OCSP responder to serve status check for itself using latest CRL (BZ#2229930)
* RHCS Fails to Upgrade if Profile Does not exist (BZ#2230102)
* CLIENT_ACCESS_SESSION_* audit events contain wrong ServerPort (BZ#2233740)
* Server-side Key Generation Produces Certificates with Identical SKID (BZ#2246422)
* Generating Keys with no OpsFlagMask set - ThalesHSM integration (BZ#2251981)
* RootCA's OCSP fails to install with the SHA-2 subjectKeyIdentifier extension (BZ#2253044)
* Make key wrapping algorithm configurable between AES-KWP and AES-CBC (BZ#2253675)
* pkidestroy log keeps HSM token password (BZ#2253683)
Users of RHCS 10 are advised to upgrade to these updated packages.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Certificate System 10.4 for RHEL 8.\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Certificate System (RHCS) is a complete implementation of an enterprise software system designed to manage enterprise Public Key Infrastructure (PKI) deployments.\n\nSecurity fixes:\n\n* JSS: memory leak in TLS connection leads to OOM (CVE-2021-4213)\n\n* pki-core:10.6/jss: memory leak in TLS connection leads to OOM (CVE-2021-4213)\n\nFor more details about the security issues, refer to the link in the References section.\n\nBug fixes:\n\n* no ROLE_ASSUME audit messages seen in TPS audit log (BZ#1549887)\n\n* Unassign certificate enrollment request not working (BZ#1858702)\n\n* Date Format on the TPS Agent Page (BZ#1984455)\n\n* Directory authentication plugin requires directory admin password just for user authentication (BZ#2017505) \n\n* Add SCEP AES support (BZ#2075363)\n\n* JSS cannot be properly initialized after using another NSS-backed security provider (BZ#2087224) \n\n* Empty subject field in CSR causes failure to certificate issuance (BZ#2105471)\n\n* RA Separation by KeyType - Set Token Status (BZ#2106153)\n\n* Disallowed \"supported_groups\" in TLS1.2 key exchange (BZ#2113782)\n\n* Some unsusable profiles are present in CA\u0027s EE page (BZ#2118662)\n\n* ClientIP and ServerIP are missing in ACCESS_SESSION_ESTABLISH/ACCESS_SESSION_TERMINATED Audit Event when PKI is acting as a Server (BZ#2122502)\n\n* add AES support for TMS server-side keygen on latest HSM / FIPS environment (BZ#2123071)\n\n* CA\u0027s Key Escrow is Failing Through httpd Reverse Proxy (BZ#2130250)\n\n* Provide Enrollment over Secure Transport / EST interface to Dogtag / RFC 7030 to support SCEP over EST (BZ#2142893)\n\n* DHE ciphers not working (dropping DHE ciphersuites) (BZ#2142903) \n\n* pkiconsole unable to connect pki servers that\u0027s in fips mode with client cert (BZ#2142904)\n\n* KRA and OCSP display banner prompts during pkispawn (BZ#2142905) \n\n* missing audit event CLIENT_ACCESS_SESSION_ESTABLISH when CS instance acting as a client and fails to connect (BZ#2142906)\n\n* EST prep work (BZ#2142907)\n\n* add AES support for TMS Shared Secret on latest HSM / FIPS environment (BZ#2142908)\n\n* CS instance when acting as a client does not observe the cipher list set in server.xml (BZ#2142909) \n\n* OCSP using AIA extension fails (BZ#2144080)\n\n* Lightweight CA: Add support for multiple sub-CAs underneath primary CA (BZ#2149115) \n\n* TPS Not allowing Token Status Change based on Revoke True/False and Hold till last True/False (BZ#2166003)\n\n* Unable to use the TPS UI \"Token Filter\" to filter a list of tokens (BZ#2179307)\n\n* TPS Not allowing Token Status Change based on Revoke True/False and Hold till last True/False (part 2) (BZ#2181142)\n\n* root CA signing cert should not have AIA extension (BZ#2182201)\n\n* PrettyPrintCert does not properly translate AIA information into a readable format (BZ#2184930)\n\n* OCSP AddCRLServlet \"SEVERE...NOT SUPPORTED\" log messages (BZ#2190283)\n\n* PrettyPrintCert does not properly translate Subject Information Access information into a readable format (BZ#2209624)\n\n* OCSP Responder not responding to certs issued by unknown CAs (BZ#2221818)\n\n* pkispawn non-CA pki instance result in TLS client-authentication to its internaldb not finding pkidbuser by default (BZ#2228209)\n\n* pkispawn externally signed sub CA clone with Thales Luna HSM fails: UNKNOWN_ISSUER (BZ#2228922)\n\n* OCSP responder to serve status check for itself using latest CRL (BZ#2229930)\n\n* RHCS Fails to Upgrade if Profile Does not exist (BZ#2230102)\n\n* CLIENT_ACCESS_SESSION_* audit events contain wrong ServerPort (BZ#2233740)\n\n* Server-side Key Generation Produces Certificates with Identical SKID (BZ#2246422)\n\n* Generating Keys with no OpsFlagMask set - ThalesHSM integration (BZ#2251981)\n\n* RootCA\u0027s OCSP fails to install with the SHA-2 subjectKeyIdentifier extension (BZ#2253044)\n\n* Make key wrapping algorithm configurable between AES-KWP and AES-CBC (BZ#2253675)\n\n* pkidestroy log keeps HSM token password (BZ#2253683)\n\nUsers of RHCS 10 are advised to upgrade to these updated packages.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0774",
"url": "https://access.redhat.com/errata/RHSA-2024:0774"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2042900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0774.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Certificate System 10.4 for RHEL 8 security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T17:53:47+00:00",
"generator": {
"date": "2024-11-22T17:53:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:0774",
"initial_release_date": "2024-02-12T09:10:53+00:00",
"revision_history": [
{
"date": "2024-02-12T09:10:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-02-12T09:10:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T17:53:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Certificate System 10.4 for RHEL 8",
"product": {
"name": "Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:certificate_system:10.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Certificate System"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-pki:10:8060020231220182310:07fb4edf",
"product": {
"name": "redhat-pki:10:8060020231220182310:07fb4edf",
"product_id": "redhat-pki:10:8060020231220182310:07fb4edf",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/redhat-pki@10:8060020231220182310:07fb4edf"
}
}
},
{
"category": "product_version",
"name": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.noarch",
"product": {
"name": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.noarch",
"product_id": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/idm-console-framework@1.3.0-1.module%2Bel8pki%2B14677%2B1ef79a68?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch",
"product": {
"name": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch",
"product_id": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ldapjdk@4.23.0-1.module%2Bel8pki%2B14677%2B1ef79a68?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ldapjdk-javadoc-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch",
"product": {
"name": "ldapjdk-javadoc-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch",
"product_id": "ldapjdk-javadoc-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ldapjdk-javadoc@4.23.0-1.module%2Bel8pki%2B14677%2B1ef79a68?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product": {
"name": "python3-redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_id": "python3-redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-redhat-pki@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-acme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product": {
"name": "redhat-pki-acme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_id": "redhat-pki-acme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-acme@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-base-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product": {
"name": "redhat-pki-base-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_id": "redhat-pki-base-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-base@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-base-java-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product": {
"name": "redhat-pki-base-java-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_id": "redhat-pki-base-java-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-base-java@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-ca-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product": {
"name": "redhat-pki-ca-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_id": "redhat-pki-ca-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-ca@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-console-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product": {
"name": "redhat-pki-console-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_id": "redhat-pki-console-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-console@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-console-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product": {
"name": "redhat-pki-console-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_id": "redhat-pki-console-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-console-theme@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-est-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product": {
"name": "redhat-pki-est-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_id": "redhat-pki-est-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-est@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-javadoc-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product": {
"name": "redhat-pki-javadoc-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_id": "redhat-pki-javadoc-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-javadoc@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-kra-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product": {
"name": "redhat-pki-kra-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_id": "redhat-pki-kra-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-kra@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-ocsp-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product": {
"name": "redhat-pki-ocsp-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_id": "redhat-pki-ocsp-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-ocsp@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-server-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product": {
"name": "redhat-pki-server-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_id": "redhat-pki-server-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-server@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-server-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product": {
"name": "redhat-pki-server-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_id": "redhat-pki-server-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-server-theme@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-tks-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product": {
"name": "redhat-pki-tks-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_id": "redhat-pki-tks-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-tks@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.noarch",
"product": {
"name": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.noarch",
"product_id": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcatjss@7.7.3-1.module%2Bel8pki%2B19895%2Bc800dfbd?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.src",
"product": {
"name": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.src",
"product_id": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/idm-console-framework@1.3.0-1.module%2Bel8pki%2B14677%2B1ef79a68?arch=src"
}
}
},
{
"category": "product_version",
"name": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src",
"product": {
"name": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src",
"product_id": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss@4.9.8-1.module%2Bel8pki%2B19895%2Bc800dfbd?arch=src"
}
}
},
{
"category": "product_version",
"name": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.src",
"product": {
"name": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.src",
"product_id": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ldapjdk@4.23.0-1.module%2Bel8pki%2B14677%2B1ef79a68?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.src",
"product": {
"name": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.src",
"product_id": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.src",
"product": {
"name": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.src",
"product_id": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcatjss@7.7.3-1.module%2Bel8pki%2B19895%2Bc800dfbd?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"product": {
"name": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"product_id": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss@4.9.8-1.module%2Bel8pki%2B19895%2Bc800dfbd?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jss-debuginfo-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"product": {
"name": "jss-debuginfo-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"product_id": "jss-debuginfo-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debuginfo@4.9.8-1.module%2Bel8pki%2B19895%2Bc800dfbd?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jss-debugsource-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"product": {
"name": "jss-debugsource-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"product_id": "jss-debugsource-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-debugsource@4.9.8-1.module%2Bel8pki%2B19895%2Bc800dfbd?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jss-javadoc-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"product": {
"name": "jss-javadoc-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"product_id": "jss-javadoc-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jss-javadoc@4.9.8-1.module%2Bel8pki%2B19895%2Bc800dfbd?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product": {
"name": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_id": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product": {
"name": "redhat-pki-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_id": "redhat-pki-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-debuginfo@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-debugsource-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product": {
"name": "redhat-pki-debugsource-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_id": "redhat-pki-debugsource-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-debugsource@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-symkey-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product": {
"name": "redhat-pki-symkey-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_id": "redhat-pki-symkey-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-symkey@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-symkey-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product": {
"name": "redhat-pki-symkey-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_id": "redhat-pki-symkey-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-symkey-debuginfo@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-tools-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product": {
"name": "redhat-pki-tools-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_id": "redhat-pki-tools-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-tools@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-tools-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product": {
"name": "redhat-pki-tools-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_id": "redhat-pki-tools-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-tools-debuginfo@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-tps-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product": {
"name": "redhat-pki-tps-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_id": "redhat-pki-tps-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-tps@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-pki-tps-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product": {
"name": "redhat-pki-tps-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_id": "redhat-pki-tps-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-pki-tps-debuginfo@10.13.9-5.module%2Bel8pki%2B21062%2B4ed906e8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
"product_reference": "redhat-pki:10:8060020231220182310:07fb4edf",
"relates_to_product_reference": "8Base-CertSys-10.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.noarch"
},
"product_reference": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.src as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.src"
},
"product_reference": "idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.src",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src"
},
"product_reference": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64 as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64"
},
"product_reference": "jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debuginfo-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64 as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:jss-debuginfo-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64"
},
"product_reference": "jss-debuginfo-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-debugsource-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64 as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:jss-debugsource-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64"
},
"product_reference": "jss-debugsource-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jss-javadoc-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64 as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:jss-javadoc-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64"
},
"product_reference": "jss-javadoc-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch"
},
"product_reference": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.src as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.src"
},
"product_reference": "ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.src",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ldapjdk-javadoc-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:ldapjdk-javadoc-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch"
},
"product_reference": "ldapjdk-javadoc-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:python3-redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch"
},
"product_reference": "python3-redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.src as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.src"
},
"product_reference": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.src",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64"
},
"product_reference": "redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-acme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-acme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch"
},
"product_reference": "redhat-pki-acme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-base-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-base-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch"
},
"product_reference": "redhat-pki-base-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-base-java-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-base-java-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch"
},
"product_reference": "redhat-pki-base-java-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-ca-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-ca-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch"
},
"product_reference": "redhat-pki-ca-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-console-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-console-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch"
},
"product_reference": "redhat-pki-console-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-console-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-console-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch"
},
"product_reference": "redhat-pki-console-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64"
},
"product_reference": "redhat-pki-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-debugsource-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-debugsource-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64"
},
"product_reference": "redhat-pki-debugsource-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-est-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-est-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch"
},
"product_reference": "redhat-pki-est-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-javadoc-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-javadoc-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch"
},
"product_reference": "redhat-pki-javadoc-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-kra-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-kra-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch"
},
"product_reference": "redhat-pki-kra-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-ocsp-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-ocsp-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch"
},
"product_reference": "redhat-pki-ocsp-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-server-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-server-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch"
},
"product_reference": "redhat-pki-server-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-server-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-server-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch"
},
"product_reference": "redhat-pki-server-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-symkey-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-symkey-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64"
},
"product_reference": "redhat-pki-symkey-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-symkey-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-symkey-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64"
},
"product_reference": "redhat-pki-symkey-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-tks-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-tks-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch"
},
"product_reference": "redhat-pki-tks-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-tools-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-tools-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64"
},
"product_reference": "redhat-pki-tools-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-tools-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-tools-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64"
},
"product_reference": "redhat-pki-tools-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-tps-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-tps-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64"
},
"product_reference": "redhat-pki-tps-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-pki-tps-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64 as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-tps-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64"
},
"product_reference": "redhat-pki-tps-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.noarch as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.noarch"
},
"product_reference": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.noarch",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.src as a component of redhat-pki:10:8060020231220182310:07fb4edf as a component of Red Hat Certificate System 10.4 for RHEL 8",
"product_id": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.src"
},
"product_reference": "tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.src",
"relates_to_product_reference": "8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4213",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2022-01-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.src",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:jss-debuginfo-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:jss-debugsource-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:jss-javadoc-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.src",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:ldapjdk-javadoc-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:python3-redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.src",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-acme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-base-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-base-java-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-ca-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-console-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-console-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-debugsource-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-est-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-javadoc-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-kra-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-ocsp-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-server-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-server-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-symkey-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-symkey-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-tks-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-tools-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-tools-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-tps-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-tps-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042900"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server\u2019s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JSS: memory leak in TLS connection leads to OOM",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64"
],
"known_not_affected": [
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:idm-console-framework-0:1.3.0-1.module+el8pki+14677+1ef79a68.src",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:jss-debuginfo-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:jss-debugsource-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:jss-javadoc-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:ldapjdk-0:4.23.0-1.module+el8pki+14677+1ef79a68.src",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:ldapjdk-javadoc-0:4.23.0-1.module+el8pki+14677+1ef79a68.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:python3-redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.src",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-acme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-base-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-base-java-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-ca-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-console-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-console-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-debugsource-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-est-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-javadoc-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-kra-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-ocsp-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-server-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-server-theme-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-symkey-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-symkey-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-tks-0:10.13.9-5.module+el8pki+21062+4ed906e8.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-tools-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-tools-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-tps-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-tps-debuginfo-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.noarch",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:tomcatjss-0:7.7.3-1.module+el8pki+19895+c800dfbd.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4213"
},
{
"category": "external",
"summary": "RHBZ#2042900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4213"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-02-12T09:10:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0774"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.src",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:jss-0:4.9.8-1.module+el8pki+19895+c800dfbd.x86_64",
"8Base-CertSys-10.4:redhat-pki:10:8060020231220182310:07fb4edf:redhat-pki-0:10.13.9-5.module+el8pki+21062+4ed906e8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JSS: memory leak in TLS connection leads to OOM"
}
]
}
GSD-2021-4213
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server’s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2021-4213",
"description": "A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server\u2019s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.",
"id": "GSD-2021-4213",
"references": [
"https://linux.oracle.com/cve/CVE-2021-4213.html",
"https://access.redhat.com/errata/RHSA-2022:1851"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-4213"
],
"details": "A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server\u2019s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.",
"id": "GSD-2021-4213",
"modified": "2023-12-13T01:23:11.799395Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2021-4213",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "JSS",
"version": {
"version_data": [
{
"version_value": "Fixed in v5.2.0-beta1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server\u2019s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-401 - Missing Release of Memory after Effective Lifetime"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900"
},
{
"name": "https://access.redhat.com/security/cve/CVE-2021-4213",
"refsource": "MISC",
"url": "https://access.redhat.com/security/cve/CVE-2021-4213"
},
{
"name": "https://security-tracker.debian.org/tracker/CVE-2021-4213",
"refsource": "MISC",
"url": "https://security-tracker.debian.org/tracker/CVE-2021-4213"
},
{
"name": "https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448",
"refsource": "MISC",
"url": "https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448"
},
{
"name": "https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2",
"refsource": "MISC",
"url": "https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:dogtagpki:network_security_services_for_java:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.1.0",
"versionStartIncluding": "5.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:dogtagpki:network_security_services_for_java:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.9.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2021-4213"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server\u2019s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448"
},
{
"name": "https://security-tracker.debian.org/tracker/CVE-2021-4213",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2021-4213"
},
{
"name": "https://access.redhat.com/security/cve/CVE-2021-4213",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2021-4213"
},
{
"name": "https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2022-08-29T13:19Z",
"publishedDate": "2022-08-24T16:15Z"
}
}
}
FKIE_CVE-2021-4213
Vulnerability from fkie_nvd - Published: 2022-08-24 16:15 - Updated: 2024-11-21 06:37
Severity ?
Summary
A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server’s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| dogtagpki | network_security_services_for_java | * | |
| dogtagpki | network_security_services_for_java | * | |
| redhat | enterprise_linux | 8.0 | |
| debian | debian_linux | 10.0 | |
| debian | debian_linux | 11.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dogtagpki:network_security_services_for_java:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE906ED1-3382-4027-81C4-4572B2E27BC2",
"versionEndExcluding": "4.9.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dogtagpki:network_security_services_for_java:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC95A8E0-BC9C-495E-B675-A2ECD52CC984",
"versionEndExcluding": "5.1.0",
"versionStartIncluding": "5.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server\u2019s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service."
},
{
"lang": "es",
"value": "Se ha encontrado un fallo en JSS, que no libera apropiadamente toda la memoria. Con el tiempo, la memoria desperdiciada es acumulada en la memoria del servidor, saturando la RAM del mismo. Este fallo permite a un atacante forzar la invocaci\u00f3n de un proceso fuera de memoria, causando una denegaci\u00f3n de servicio."
}
],
"id": "CVE-2021-4213",
"lastModified": "2024-11-21T06:37:09.933",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-08-24T16:15:09.980",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2021-4213"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2021-4213"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2021-4213"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042900"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2021-4213"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…