Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-29371 (GCVE-0-2024-29371)
Vulnerability from cvelistv5 – Published: 2025-12-17 00:00 – Updated: 2026-01-23 19:28- n/a
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-29371",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-17T18:38:20.096134Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1259",
"description": "CWE-1259 Improper Restriction of Security Token Assignment",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-17T18:48:36.126Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-23T19:28:10.386Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-29371",
"datePublished": "2025-12-17T00:00:00.000Z",
"dateReserved": "2024-03-19T00:00:00.000Z",
"dateUpdated": "2026-01-23T19:28:10.386Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-29371",
"date": "2026-04-29",
"epss": "0.00023",
"percentile": "0.06269"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-29371\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2025-12-17T16:16:04.567\",\"lastModified\":\"2026-01-23T20:15:51.650\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1259\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jose4j_project:jose4j:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.9.5\",\"matchCriteriaId\":\"DE62FF6D-FC62-42B0-9ED4-76A0C4419975\"}]}]}],\"references\":[{\"url\":\"https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Mitigation\"]},{\"url\":\"https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Mitigation\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-29371\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-12-17T18:38:20.096134Z\"}}}], \"references\": [{\"url\": \"https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack\", \"tags\": [\"exploit\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1259\", \"description\": \"CWE-1259 Improper Restriction of Security Token Assignment\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-17T18:15:31.759Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2026-01-23T19:28:10.386Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-29371\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-23T19:28:10.386Z\", \"dateReserved\": \"2024-03-19T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2025-12-17T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2024:5481
Vulnerability from csaf_redhat - Published: 2024-08-15 20:11 - Updated: 2026-04-29 04:36A server-side request forgery (SSRF) vulnerability was found in Apache CXF. This issue occurs in attacks on webservices that take at least one parameter of any type, and when Aegisdatabind is used. Users of other data bindings including the default databinding are not impacted.
A flaw was found in the io.netty:netty-codec-http package. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling issues due to the accumulation of data in the HttpPostRequestDecoder. The decoder cumulates bytes in the undecodedChunk buffer until it can decode a field, allowing data to accumulate without limits. This flaw allows an attacker to cause a denial of service by sending a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData list.
A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.
A vulnerability was found in Bouncy Castle. An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java). Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.
A flaw was found in the Bouncy Castle Java cryptography APIs. Affected versions of the org.bouncycastle:bcprov-jdk18on package are vulnerable to Observable Timing Discrepancy via the PKCS#1 1.5 and OAEP decryption process (a.k.a. Marvin Attack). An attacker can recover cipher-texts via a side-channel attack by exploiting the Marvin security flaw. The PKCS#1 1.5 attack vector leaks data via javax.crypto.Cipher exceptions and the OAEP interface vector leaks via the bit size of the decrypted data.
A flaw was found in the Bouncy Castle Java Cryptography APIs. Affected versions of this package are vulnerable to an Infinite loop issue in ED25519 verification in the ScalarUtil class. This flaw allows an attacker to send a malicious signature and public key to trigger a denial of service.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 8.0 for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.0.3 serves as a replacement for Red Hat JBoss Enterprise Application Platform 8.0.2, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 8.0.3 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding [eap-8.0.z] (CVE-2024-28752)\n\n* org.bouncycastle-bcprov-jdk18on: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) [eap-8.0.z] (CVE-2024-30171)\n\n* netty-codec-http: Allocation of Resources Without Limits or Throttling [eap-8.0.z] (CVE-2024-29025)\n\n* org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class [eap-8.0.z] (CVE-2024-30172)\n\n* org.bouncycastle:bcprov-jdk18on: org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service [eap-8.0.z] (CVE-2024-29857)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:5481",
"url": "https://access.redhat.com/errata/RHSA-2024:5481"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/8.0/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/8.0/"
},
{
"category": "external",
"summary": "2270732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732"
},
{
"category": "external",
"summary": "2272907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907"
},
{
"category": "external",
"summary": "2276360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276360"
},
{
"category": "external",
"summary": "2293025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293025"
},
{
"category": "external",
"summary": "2293028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293028"
},
{
"category": "external",
"summary": "JBEAP-25224",
"url": "https://issues.redhat.com/browse/JBEAP-25224"
},
{
"category": "external",
"summary": "JBEAP-26018",
"url": "https://issues.redhat.com/browse/JBEAP-26018"
},
{
"category": "external",
"summary": "JBEAP-26696",
"url": "https://issues.redhat.com/browse/JBEAP-26696"
},
{
"category": "external",
"summary": "JBEAP-26790",
"url": "https://issues.redhat.com/browse/JBEAP-26790"
},
{
"category": "external",
"summary": "JBEAP-26791",
"url": "https://issues.redhat.com/browse/JBEAP-26791"
},
{
"category": "external",
"summary": "JBEAP-26793",
"url": "https://issues.redhat.com/browse/JBEAP-26793"
},
{
"category": "external",
"summary": "JBEAP-26802",
"url": "https://issues.redhat.com/browse/JBEAP-26802"
},
{
"category": "external",
"summary": "JBEAP-26816",
"url": "https://issues.redhat.com/browse/JBEAP-26816"
},
{
"category": "external",
"summary": "JBEAP-26823",
"url": "https://issues.redhat.com/browse/JBEAP-26823"
},
{
"category": "external",
"summary": "JBEAP-26843",
"url": "https://issues.redhat.com/browse/JBEAP-26843"
},
{
"category": "external",
"summary": "JBEAP-26886",
"url": "https://issues.redhat.com/browse/JBEAP-26886"
},
{
"category": "external",
"summary": "JBEAP-26932",
"url": "https://issues.redhat.com/browse/JBEAP-26932"
},
{
"category": "external",
"summary": "JBEAP-26948",
"url": "https://issues.redhat.com/browse/JBEAP-26948"
},
{
"category": "external",
"summary": "JBEAP-26961",
"url": "https://issues.redhat.com/browse/JBEAP-26961"
},
{
"category": "external",
"summary": "JBEAP-26962",
"url": "https://issues.redhat.com/browse/JBEAP-26962"
},
{
"category": "external",
"summary": "JBEAP-26966",
"url": "https://issues.redhat.com/browse/JBEAP-26966"
},
{
"category": "external",
"summary": "JBEAP-26986",
"url": "https://issues.redhat.com/browse/JBEAP-26986"
},
{
"category": "external",
"summary": "JBEAP-27002",
"url": "https://issues.redhat.com/browse/JBEAP-27002"
},
{
"category": "external",
"summary": "JBEAP-27019",
"url": "https://issues.redhat.com/browse/JBEAP-27019"
},
{
"category": "external",
"summary": "JBEAP-27055",
"url": "https://issues.redhat.com/browse/JBEAP-27055"
},
{
"category": "external",
"summary": "JBEAP-27090",
"url": "https://issues.redhat.com/browse/JBEAP-27090"
},
{
"category": "external",
"summary": "JBEAP-27192",
"url": "https://issues.redhat.com/browse/JBEAP-27192"
},
{
"category": "external",
"summary": "JBEAP-27194",
"url": "https://issues.redhat.com/browse/JBEAP-27194"
},
{
"category": "external",
"summary": "JBEAP-27261",
"url": "https://issues.redhat.com/browse/JBEAP-27261"
},
{
"category": "external",
"summary": "JBEAP-27262",
"url": "https://issues.redhat.com/browse/JBEAP-27262"
},
{
"category": "external",
"summary": "JBEAP-27327",
"url": "https://issues.redhat.com/browse/JBEAP-27327"
},
{
"category": "external",
"summary": "JBEAP-27356",
"url": "https://issues.redhat.com/browse/JBEAP-27356"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5481.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.3 Security update",
"tracking": {
"current_release_date": "2026-04-29T04:36:15+00:00",
"generator": {
"date": "2026-04-29T04:36:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.6"
}
},
"id": "RHSA-2024:5481",
"initial_release_date": "2024-08-15T20:11:37+00:00",
"revision_history": [
{
"date": "2024-08-15T20:11:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-08-15T20:11:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T04:36:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 8.0 for RHEL 9",
"product": {
"name": "Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"product": {
"name": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"product_id": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wss4j@3.0.3-1.redhat_00008.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"product": {
"name": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"product_id": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-neethi@3.2.0-1.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"product": {
"name": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"product_id": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jbossws-cxf@7.1.0-1.Final_redhat_00002.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-mod_cluster@2.0.3-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-hal-console@3.6.19-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"product": {
"name": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"product_id": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-velocity@2.3.0-3.redhat_00009.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly-elytron@2.2.6-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly-discovery@1.3.0-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"product_id": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-bouncycastle@1.78.1-1.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"product": {
"name": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"product_id": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-sshd@2.12.1-2.redhat_00002.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"product_id": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-cxf@4.0.4-1.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"product_id": "eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-angus@2.0.3-1.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"product": {
"name": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"product_id": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-caffeine@3.1.8-2.redhat_00002.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"product": {
"name": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"product_id": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jasypt@1.9.3-4.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"product_id": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-mime4j@0.8.11-1.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"product": {
"name": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"product_id": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-mail@2.1.3-1.redhat_00002.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"product": {
"name": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"product_id": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-java-classmate@1.5.1-3.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"product_id": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jsf-impl@4.0.7-1.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"product_id": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-guava-failureaccess@1.0.2-1.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"product": {
"name": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"product_id": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-joda-time@2.12.7-1.redhat_00002.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"product": {
"name": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"product_id": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-xml-security@3.0.4-1.redhat_00005.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"product": {
"name": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"product_id": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy@6.2.7-2.Final_redhat_00002.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty@4.1.108-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"product_id": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-stax2-api@4.2.2-1.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src",
"product": {
"name": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src",
"product_id": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-yasson@3.0.3-3.redhat_00002.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"product": {
"name": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"product_id": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-commons-codec@1.15.0-6.redhat_00016.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"product": {
"name": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"product_id": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-commons-cli@1.4.0-2.redhat_00003.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"product": {
"name": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"product_id": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-angus-activation@2.0.1-3.redhat_00006.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"product": {
"name": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"product_id": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-httpcomponents-asyncclient@4.1.5-3.redhat_00005.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"product_id": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-reactivex-rxjava@3.1.8-1.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"product": {
"name": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"product_id": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis@2.21.0-5.redhat_00052.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"product_id": "eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-websocket@2.1.1-1.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-xnio-transport@0.1.10-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"product_id": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-metadata@16.0.0-3.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"product": {
"name": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"product_id": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-hornetq@2.4.9-4.Final_redhat_00002.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"product": {
"name": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"product_id": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-cxf-xjc-utils@4.0.0-5.redhat_00003.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"product_id": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml@4.2.0-4.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"product_id": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-weld-core@5.1.2-2.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"product": {
"name": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"product_id": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-json-api@2.1.3-1.redhat_00002.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"product": {
"name": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"product_id": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-parsson@1.1.5-2.redhat_00002.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"product_id": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-xml-bind-api@4.0.1-1.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-transport-native-epoll@4.1.108-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"product": {
"name": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"product_id": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-commons-beanutils@1.9.4-13.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"product": {
"name": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"product_id": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wsdl4j@1.6.3-5.redhat_00008.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"product": {
"name": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"product_id": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-httpcomponents-client@4.5.14-4.redhat_00012.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"product": {
"name": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"product_id": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-eap-product-conf-parent@800.3.0-2.GA_redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-openjdk-orb@10.1.0-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"product_id": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan@14.0.30-2.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"product": {
"name": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"product_id": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly@8.0.3-9.GA_redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"product": {
"name": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"product_id": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-servlet-api@6.0.0-5.redhat_00006.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"product_id": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jandex@3.0.8-1.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"product_id": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-byte-buddy@1.14.18-1.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"product": {
"name": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"product_id": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-guava-libraries@33.0.0-1.jre_redhat_00002.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"product_id": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-slf4j@2.0.13-1.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"product": {
"name": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"product_id": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-httpcomponents-core@4.4.16-4.redhat_00010.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"product": {
"name": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"product_id": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jaxb@4.0.5-2.redhat_00001.1.el9eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product": {
"name": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product_id": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wss4j@3.0.3-1.redhat_00008.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product": {
"name": "eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product_id": "eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wss4j-bindings@3.0.3-1.redhat_00008.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product": {
"name": "eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product_id": "eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wss4j-policy@3.0.3-1.redhat_00008.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product": {
"name": "eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product_id": "eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wss4j-ws-security-common@3.0.3-1.redhat_00008.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product": {
"name": "eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product_id": "eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wss4j-ws-security-dom@3.0.3-1.redhat_00008.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product": {
"name": "eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product_id": "eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wss4j-ws-security-policy-stax@3.0.3-1.redhat_00008.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product": {
"name": "eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product_id": "eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wss4j-ws-security-stax@3.0.3-1.redhat_00008.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"product_id": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-neethi@3.2.0-1.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jbossws-cxf@7.1.0-1.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-mod_cluster@2.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-hal-console@3.6.19-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"product": {
"name": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"product_id": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-velocity@2.3.0-3.redhat_00009.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"product": {
"name": "eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"product_id": "eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-velocity-engine-core@2.3.0-3.redhat_00009.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly-elytron@2.2.6-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly-elytron-tool@2.2.6-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly-discovery-client@1.3.0-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-bouncycastle@1.78.1-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-bouncycastle-jmail@1.78.1-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-bouncycastle-pg@1.78.1-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-bouncycastle-pkix@1.78.1-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-bouncycastle-prov@1.78.1-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-bouncycastle-util@1.78.1-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"product_id": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-sshd@2.12.1-2.redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-cxf@4.0.4-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-cxf-rt@4.0.4-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-cxf-services@4.0.4-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-cxf-tools@4.0.4-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-angus-mail@2.0.3-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"product_id": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-caffeine@3.1.8-2.redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"product_id": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jasypt@1.9.3-4.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-mime4j@0.8.11-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-mime4j-dom@0.8.11-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-mime4j-storage@0.8.11-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"product_id": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-mail@2.1.3-1.redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"product_id": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-java-classmate@1.5.1-3.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jsf-impl@4.0.7-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-guava-failureaccess@1.0.2-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"product_id": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-joda-time@2.12.7-1.redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"product": {
"name": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"product_id": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-xml-security@3.0.4-1.redhat_00005.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy@6.2.7-2.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-atom-provider@6.2.7-2.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-cdi@6.2.7-2.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-client@6.2.7-2.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-client-api@6.2.7-2.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-core@6.2.7-2.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-core-spi@6.2.7-2.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-crypto@6.2.7-2.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-jackson2-provider@6.2.7-2.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-jaxb-provider@6.2.7-2.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-jsapi@6.2.7-2.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-json-binding-provider@6.2.7-2.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-json-p-provider@6.2.7-2.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-multipart-provider@6.2.7-2.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-rxjava2@6.2.7-2.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-validator-provider@6.2.7-2.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty@4.1.108-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-buffer@4.1.108-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-codec@4.1.108-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-codec-dns@4.1.108-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-codec-http@4.1.108-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-codec-socks@4.1.108-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-common@4.1.108-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-handler@4.1.108-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-handler-proxy@4.1.108-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-resolver@4.1.108-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-resolver-dns@4.1.108-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-transport@4.1.108-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-transport-classes-epoll@4.1.108-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-transport-native-unix-common@4.1.108-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-stax2-api@4.2.2-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"product_id": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-yasson@3.0.3-3.redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"product": {
"name": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"product_id": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-commons-codec@1.15.0-6.redhat_00016.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"product_id": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-commons-cli@1.4.0-2.redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"product": {
"name": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"product_id": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-angus-activation@2.0.1-3.redhat_00006.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"product": {
"name": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"product_id": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-httpcomponents-asyncclient@4.1.5-3.redhat_00005.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-reactivex-rxjava@3.1.8-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product": {
"name": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_id": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis@2.21.0-5.redhat_00052.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product": {
"name": "eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_id": "eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-cli@2.21.0-5.redhat_00052.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product": {
"name": "eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_id": "eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-commons@2.21.0-5.redhat_00052.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product": {
"name": "eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_id": "eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-core-client@2.21.0-5.redhat_00052.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product": {
"name": "eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_id": "eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-dto@2.21.0-5.redhat_00052.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product": {
"name": "eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_id": "eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-hornetq-protocol@2.21.0-5.redhat_00052.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product": {
"name": "eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_id": "eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-hqclient-protocol@2.21.0-5.redhat_00052.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product": {
"name": "eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_id": "eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-client@2.21.0-5.redhat_00052.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product": {
"name": "eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_id": "eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-ra@2.21.0-5.redhat_00052.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product": {
"name": "eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_id": "eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-server@2.21.0-5.redhat_00052.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product": {
"name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_id": "eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-service-extensions@2.21.0-5.redhat_00052.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product": {
"name": "eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_id": "eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-jdbc-store@2.21.0-5.redhat_00052.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product": {
"name": "eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_id": "eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-journal@2.21.0-5.redhat_00052.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product": {
"name": "eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_id": "eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-selector@2.21.0-5.redhat_00052.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product": {
"name": "eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_id": "eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-server@2.21.0-5.redhat_00052.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-websocket-api@2.1.1-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-websocket-client-api@2.1.1-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-xnio-transport@0.1.10-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-metadata@16.0.0-3.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-metadata-appclient@16.0.0-3.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-metadata-common@16.0.0-3.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-metadata-ear@16.0.0-3.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-metadata-ejb@16.0.0-3.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-metadata-web@16.0.0-3.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-hornetq@2.4.9-4.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-hornetq-commons@2.4.9-4.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-hornetq-core-client@2.4.9-4.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-hornetq-jakarta-client@2.4.9-4.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product_id": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-cxf-xjc-utils@4.0.0-5.redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product_id": "eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-cxf-xjc-boolean@4.0.0-5.redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product_id": "eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-cxf-xjc-bug986@4.0.0-5.redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product_id": "eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-cxf-xjc-dv@4.0.0-5.redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product_id": "eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-cxf-xjc-runtime@4.0.0-5.redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product_id": "eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-cxf-xjc-ts@4.0.0-5.redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml@4.2.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-core@4.2.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-profile-api@4.2.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-saml-api@4.2.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-saml-impl@4.2.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-security-api@4.2.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-security-impl@4.2.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-soap-api@4.2.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-xacml-api@4.2.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-xacml-impl@4.2.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-xacml-saml-api@4.2.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-xacml-saml-impl@4.2.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-xmlsec-api@4.2.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-xmlsec-impl@4.2.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-weld-core@5.1.2-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-weld-core-impl@5.1.2-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-weld-core-jsf@5.1.2-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-weld-ejb@5.1.2-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-weld-jta@5.1.2-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-weld-lite-extension-translator@5.1.2-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-weld-web@5.1.2-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"product_id": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-json-api@2.1.3-1.redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"product_id": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-parsson@1.1.5-2.redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-xml-bind-api@4.0.1-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"product_id": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-commons-beanutils@1.9.4-13.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"product": {
"name": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"product_id": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wsdl4j@1.6.3-5.redhat_00008.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"product": {
"name": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"product_id": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-httpcomponents-client@4.5.14-4.redhat_00012.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"product_id": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-eap-product-conf-parent@800.3.0-2.GA_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"product_id": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-eap-product-conf-wildfly-ee-feature-pack@800.3.0-2.GA_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-openjdk-orb@10.1.0-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-cachestore-jdbc-common-jakarta@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-cachestore-jdbc-jakarta@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-cachestore-remote@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-cdi-common-jakarta@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-cdi-embedded-jakarta@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-cdi-remote-jakarta@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-client-hotrod-jakarta@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-clustered-counter@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-clustered-lock@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-commons-jakarta@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-component-annotations@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-core-jakarta@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-hibernate-cache-commons@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-hibernate-cache-spi@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-hibernate-cache-v62@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-objectfilter@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-query@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-query-core@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-query-dsl@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-remote-query-client@14.0.30-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"product_id": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly@8.0.3-9.GA_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"product_id": "eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly-java-jdk11@8.0.3-9.GA_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"product_id": "eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly-java-jdk17@8.0.3-9.GA_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"product_id": "eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly-modules@8.0.3-9.GA_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"product": {
"name": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"product_id": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-servlet-api@6.0.0-5.redhat_00006.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jandex@3.0.8-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-byte-buddy@1.14.18-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-guava@33.0.0-1.jre_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"product_id": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-guava-libraries@33.0.0-1.jre_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-slf4j@2.0.13-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-slf4j-api@2.0.13-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"product": {
"name": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"product_id": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-httpcomponents-core@4.4.16-4.redhat_00010.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-codemodel@4.0.5-2.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jaxb@4.0.5-2.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jaxb-core@4.0.5-2.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jaxb-jxc@4.0.5-2.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jaxb-runtime@4.0.5-2.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jaxb-xjc@4.0.5-2.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-relaxng-datatype@4.0.5-2.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-rngom@4.0.5-2.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-txw2@4.0.5-2.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_id": "eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-xsom@4.0.5-2.redhat_00001.1.el9eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"product": {
"name": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"product_id": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-transport-native-epoll@4.1.108-1.Final_redhat_00001.1.el9eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"product": {
"name": "eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"product_id": "eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-transport-native-epoll-debuginfo@4.1.108-1.Final_redhat_00001.1.el9eap?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch"
},
"product_reference": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src"
},
"product_reference": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch"
},
"product_reference": "eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch"
},
"product_reference": "eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch"
},
"product_reference": "eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch"
},
"product_reference": "eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch"
},
"product_reference": "eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch"
},
"product_reference": "eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch"
},
"product_reference": "eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch"
},
"product_reference": "eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch"
},
"product_reference": "eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch"
},
"product_reference": "eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch"
},
"product_reference": "eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch"
},
"product_reference": "eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch"
},
"product_reference": "eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch"
},
"product_reference": "eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch"
},
"product_reference": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src"
},
"product_reference": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src"
},
"product_reference": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src"
},
"product_reference": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch"
},
"product_reference": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src"
},
"product_reference": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src"
},
"product_reference": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src"
},
"product_reference": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src"
},
"product_reference": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src"
},
"product_reference": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src"
},
"product_reference": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src"
},
"product_reference": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch"
},
"product_reference": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src"
},
"product_reference": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch"
},
"product_reference": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src"
},
"product_reference": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch"
},
"product_reference": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src"
},
"product_reference": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src"
},
"product_reference": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src"
},
"product_reference": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch"
},
"product_reference": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src"
},
"product_reference": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src"
},
"product_reference": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src"
},
"product_reference": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src"
},
"product_reference": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src"
},
"product_reference": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src"
},
"product_reference": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64"
},
"product_reference": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64"
},
"product_reference": "eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src"
},
"product_reference": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src"
},
"product_reference": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch"
},
"product_reference": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src"
},
"product_reference": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch"
},
"product_reference": "eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src"
},
"product_reference": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch"
},
"product_reference": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src"
},
"product_reference": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch"
},
"product_reference": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src"
},
"product_reference": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch"
},
"product_reference": "eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch"
},
"product_reference": "eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch"
},
"product_reference": "eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch"
},
"product_reference": "eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch"
},
"product_reference": "eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch"
},
"product_reference": "eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch"
},
"product_reference": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src"
},
"product_reference": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9",
"product_id": "9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
},
"product_reference": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-8.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-28752",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"discovery_date": "2024-03-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270732"
}
],
"notes": [
{
"category": "description",
"text": "A server-side request forgery (SSRF) vulnerability was found in Apache CXF. This issue occurs in attacks on webservices that take at least one parameter of any type, and when Aegisdatabind is used. Users of other data bindings including the default databinding are not impacted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates this as an Important impact due to the fact this requires Aegis databind, which is not the default databinding for Apache CXF.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch"
],
"known_not_affected": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-28752"
},
{
"category": "external",
"summary": "RHBZ#2270732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-28752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752"
},
{
"category": "external",
"summary": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt",
"url": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-qmgx-j96g-4428",
"url": "https://github.com/advisories/GHSA-qmgx-j96g-4428"
}
],
"release_date": "2024-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:11:37+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5481"
},
{
"category": "workaround",
"details": "No mitigation is currently available for this vulnerability. Please make sure to update as the fixes become available.",
"product_ids": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2272907"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the io.netty:netty-codec-http package. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling issues due to the accumulation of data in the HttpPostRequestDecoder. The decoder cumulates bytes in the undecodedChunk buffer until it can decode a field, allowing data to accumulate without limits. This flaw allows an attacker to cause a denial of service by sending a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData list.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty-codec-http: Allocation of Resources Without Limits or Throttling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability in io.netty:netty-codec-http, allowing for Allocation of Resources Without Limits or Throttling issues, is assessed as moderate severity due to its potential impact on system availability and performance. By exploiting the flaw in HttpPostRequestDecoder, an attacker can craft chunked POST requests with numerous small fields, causing excessive accumulation of data in memory buffers. This unrestricted accumulation can lead to significant memory consumption on the server, potentially exhausting available resources and resulting in denial of service (DoS) conditions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29025"
},
{
"category": "external",
"summary": "RHBZ#2272907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025"
},
{
"category": "external",
"summary": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3",
"url": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c",
"url": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v",
"url": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812",
"url": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812"
}
],
"release_date": "2024-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:11:37+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5481"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty-codec-http: Allocation of Resources Without Limits or Throttling"
},
{
"cve": "CVE-2024-29371",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-17T16:01:18.173727+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423194"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important as it can lead to a Denial of Service in applications that process untrusted JSON Web Encryption tokens. An attacker can craft a malicious JWE token with an exceptionally high compression ratio, causing excessive memory allocation and processing time during decompression in affected components like jose4j. This affects products such as Red Hat AMQ, Enterprise Application Platform (EAP 8.0.z, 8.1.z), Red Hat JBoss Fuse, JBoss Data Grid, OpenShift Developer Tools \u0026 Services, Red Hat build of Apache Camel, Red Hat Integration, Red Hat OpenShift Dev Spaces, Red Hat Process Automation Manager, Red Hat Single Sign-On (RH-SSO), Insights, cloud.redhat.com, and OpenShift Serverless.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "RHBZ#2423194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack",
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
}
],
"release_date": "2025-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:11:37+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5481"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression"
},
{
"cve": "CVE-2024-29857",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293028"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Bouncy Castle. An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java). Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29857"
},
{
"category": "external",
"summary": "RHBZ#2293028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29857",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29857"
}
],
"release_date": "2024-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:11:37+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5481"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service"
},
{
"acknowledgments": [
{
"names": [
"Hubert Kario"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2024-30171",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"discovery_date": "2024-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2276360"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Bouncy Castle Java cryptography APIs. Affected versions of the org.bouncycastle:bcprov-jdk18on package are vulnerable to Observable Timing Discrepancy via the PKCS#1 1.5 and OAEP decryption process (a.k.a. Marvin Attack). An attacker can recover cipher-texts via a side-channel attack by exploiting the Marvin security flaw. The PKCS#1 1.5 attack vector leaks data via javax.crypto.Cipher exceptions and the OAEP interface vector leaks via the bit size of the decrypted data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-30171"
},
{
"category": "external",
"summary": "RHBZ#2276360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276360"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-30171",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-30171"
},
{
"category": "external",
"summary": "https://people.redhat.com/~hkario/marvin/",
"url": "https://people.redhat.com/~hkario/marvin/"
}
],
"release_date": "2024-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:11:37+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5481"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack)"
},
{
"cve": "CVE-2024-30172",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293025"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Bouncy Castle Java Cryptography APIs. Affected versions of this package are vulnerable to an Infinite loop issue in ED25519 verification in the ScalarUtil class. This flaw allows an attacker to send a malicious signature and public key to trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-30172"
},
{
"category": "external",
"summary": "RHBZ#2293025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293025"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-30172",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-30172"
},
{
"category": "external",
"summary": "https://www.bouncycastle.org/latest_releases.html",
"url": "https://www.bouncycastle.org/latest_releases.html"
}
],
"release_date": "2024-05-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:11:37+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5481"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el9eap.src",
"9Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el9eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class"
}
]
}
RHSA-2024:5479
Vulnerability from csaf_redhat - Published: 2024-08-15 20:11 - Updated: 2026-04-29 04:36A server-side request forgery (SSRF) vulnerability was found in Apache CXF. This issue occurs in attacks on webservices that take at least one parameter of any type, and when Aegisdatabind is used. Users of other data bindings including the default databinding are not impacted.
A flaw was found in the io.netty:netty-codec-http package. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling issues due to the accumulation of data in the HttpPostRequestDecoder. The decoder cumulates bytes in the undecodedChunk buffer until it can decode a field, allowing data to accumulate without limits. This flaw allows an attacker to cause a denial of service by sending a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData list.
A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.
A vulnerability was found in Bouncy Castle. An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java). Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.
A flaw was found in the Bouncy Castle Java cryptography APIs. Affected versions of the org.bouncycastle:bcprov-jdk18on package are vulnerable to Observable Timing Discrepancy via the PKCS#1 1.5 and OAEP decryption process (a.k.a. Marvin Attack). An attacker can recover cipher-texts via a side-channel attack by exploiting the Marvin security flaw. The PKCS#1 1.5 attack vector leaks data via javax.crypto.Cipher exceptions and the OAEP interface vector leaks via the bit size of the decrypted data.
A flaw was found in the Bouncy Castle Java Cryptography APIs. Affected versions of this package are vulnerable to an Infinite loop issue in ED25519 verification in the ScalarUtil class. This flaw allows an attacker to send a malicious signature and public key to trigger a denial of service.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 8.0 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.0.3 serves as a replacement for Red Hat JBoss Enterprise Application Platform 8.0.2, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 8.0.3 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding [eap-8.0.z] (CVE-2024-28752)\n\n* org.bouncycastle-bcprov-jdk18on: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) [eap-8.0.z] (CVE-2024-30171)\n\n* netty-codec-http: Allocation of Resources Without Limits or Throttling [eap-8.0.z] (CVE-2024-29025)\n\n* org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class [eap-8.0.z] (CVE-2024-30172)\n\n* org.bouncycastle:bcprov-jdk18on: org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service [eap-8.0.z] (CVE-2024-29857)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:5479",
"url": "https://access.redhat.com/errata/RHSA-2024:5479"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/8.0/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/8.0/"
},
{
"category": "external",
"summary": "2270732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732"
},
{
"category": "external",
"summary": "2272907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907"
},
{
"category": "external",
"summary": "2276360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276360"
},
{
"category": "external",
"summary": "2293025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293025"
},
{
"category": "external",
"summary": "2293028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293028"
},
{
"category": "external",
"summary": "JBEAP-25224",
"url": "https://issues.redhat.com/browse/JBEAP-25224"
},
{
"category": "external",
"summary": "JBEAP-26018",
"url": "https://issues.redhat.com/browse/JBEAP-26018"
},
{
"category": "external",
"summary": "JBEAP-26696",
"url": "https://issues.redhat.com/browse/JBEAP-26696"
},
{
"category": "external",
"summary": "JBEAP-26790",
"url": "https://issues.redhat.com/browse/JBEAP-26790"
},
{
"category": "external",
"summary": "JBEAP-26791",
"url": "https://issues.redhat.com/browse/JBEAP-26791"
},
{
"category": "external",
"summary": "JBEAP-26792",
"url": "https://issues.redhat.com/browse/JBEAP-26792"
},
{
"category": "external",
"summary": "JBEAP-26802",
"url": "https://issues.redhat.com/browse/JBEAP-26802"
},
{
"category": "external",
"summary": "JBEAP-26816",
"url": "https://issues.redhat.com/browse/JBEAP-26816"
},
{
"category": "external",
"summary": "JBEAP-26823",
"url": "https://issues.redhat.com/browse/JBEAP-26823"
},
{
"category": "external",
"summary": "JBEAP-26843",
"url": "https://issues.redhat.com/browse/JBEAP-26843"
},
{
"category": "external",
"summary": "JBEAP-26886",
"url": "https://issues.redhat.com/browse/JBEAP-26886"
},
{
"category": "external",
"summary": "JBEAP-26932",
"url": "https://issues.redhat.com/browse/JBEAP-26932"
},
{
"category": "external",
"summary": "JBEAP-26948",
"url": "https://issues.redhat.com/browse/JBEAP-26948"
},
{
"category": "external",
"summary": "JBEAP-26961",
"url": "https://issues.redhat.com/browse/JBEAP-26961"
},
{
"category": "external",
"summary": "JBEAP-26962",
"url": "https://issues.redhat.com/browse/JBEAP-26962"
},
{
"category": "external",
"summary": "JBEAP-26966",
"url": "https://issues.redhat.com/browse/JBEAP-26966"
},
{
"category": "external",
"summary": "JBEAP-26986",
"url": "https://issues.redhat.com/browse/JBEAP-26986"
},
{
"category": "external",
"summary": "JBEAP-27002",
"url": "https://issues.redhat.com/browse/JBEAP-27002"
},
{
"category": "external",
"summary": "JBEAP-27019",
"url": "https://issues.redhat.com/browse/JBEAP-27019"
},
{
"category": "external",
"summary": "JBEAP-27055",
"url": "https://issues.redhat.com/browse/JBEAP-27055"
},
{
"category": "external",
"summary": "JBEAP-27090",
"url": "https://issues.redhat.com/browse/JBEAP-27090"
},
{
"category": "external",
"summary": "JBEAP-27192",
"url": "https://issues.redhat.com/browse/JBEAP-27192"
},
{
"category": "external",
"summary": "JBEAP-27194",
"url": "https://issues.redhat.com/browse/JBEAP-27194"
},
{
"category": "external",
"summary": "JBEAP-27261",
"url": "https://issues.redhat.com/browse/JBEAP-27261"
},
{
"category": "external",
"summary": "JBEAP-27262",
"url": "https://issues.redhat.com/browse/JBEAP-27262"
},
{
"category": "external",
"summary": "JBEAP-27327",
"url": "https://issues.redhat.com/browse/JBEAP-27327"
},
{
"category": "external",
"summary": "JBEAP-27356",
"url": "https://issues.redhat.com/browse/JBEAP-27356"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5479.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.3 Security update",
"tracking": {
"current_release_date": "2026-04-29T04:36:13+00:00",
"generator": {
"date": "2026-04-29T04:36:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.6"
}
},
"id": "RHSA-2024:5479",
"initial_release_date": "2024-08-15T20:11:43+00:00",
"revision_history": [
{
"date": "2024-08-15T20:11:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-08-15T20:11:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T04:36:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 8.0 for RHEL 8",
"product": {
"name": "Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-mod_cluster@2.0.3-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"product": {
"name": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"product_id": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-neethi@3.2.0-1.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"product": {
"name": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"product_id": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jbossws-cxf@7.1.0-1.Final_redhat_00002.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-hal-console@3.6.19-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"product": {
"name": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"product_id": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-velocity@2.3.0-3.redhat_00009.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly-elytron@2.2.6-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly-discovery@1.3.0-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"product": {
"name": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"product_id": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wss4j@3.0.3-1.redhat_00008.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"product_id": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-bouncycastle@1.78.1-1.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"product": {
"name": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"product_id": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-sshd@2.12.1-2.redhat_00002.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"product": {
"name": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"product_id": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jasypt@1.9.3-4.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"product_id": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-cxf@4.0.4-1.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"product": {
"name": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"product_id": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-caffeine@3.1.8-2.redhat_00002.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"product_id": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-mime4j@0.8.11-1.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"product_id": "eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-angus@2.0.3-1.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"product": {
"name": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"product_id": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-java-classmate@1.5.1-3.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"product": {
"name": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"product_id": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-mail@2.1.3-1.redhat_00002.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"product": {
"name": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"product_id": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-joda-time@2.12.7-1.redhat_00002.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"product": {
"name": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"product_id": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-xml-security@3.0.4-1.redhat_00005.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"product_id": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-guava-failureaccess@1.0.2-1.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"product_id": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jsf-impl@4.0.7-1.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"product": {
"name": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"product_id": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy@6.2.7-2.Final_redhat_00002.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src",
"product": {
"name": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src",
"product_id": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-yasson@3.0.3-3.redhat_00002.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"product_id": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-stax2-api@4.2.2-1.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty@4.1.108-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"product": {
"name": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"product_id": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-commons-codec@1.15.0-6.redhat_00016.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"product": {
"name": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"product_id": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-commons-cli@1.4.0-2.redhat_00003.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"product": {
"name": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"product_id": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-angus-activation@2.0.1-3.redhat_00006.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"product": {
"name": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"product_id": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-httpcomponents-asyncclient@4.1.5-3.redhat_00005.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"product_id": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-reactivex-rxjava@3.1.8-1.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"product": {
"name": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"product_id": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis@2.21.0-5.redhat_00052.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"product_id": "eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-websocket@2.1.1-1.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-xnio-transport@0.1.10-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"product_id": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-metadata@16.0.0-3.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"product_id": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-weld-core@5.1.2-2.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"product": {
"name": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"product_id": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-cxf-xjc-utils@4.0.0-5.redhat_00003.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"product_id": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml@4.2.0-4.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"product": {
"name": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"product_id": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-hornetq@2.4.9-4.Final_redhat_00002.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"product": {
"name": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"product_id": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-json-api@2.1.3-1.redhat_00002.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"product": {
"name": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"product_id": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-parsson@1.1.5-2.redhat_00002.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"product_id": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-xml-bind-api@4.0.1-1.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-transport-native-epoll@4.1.108-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"product_id": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-slf4j@2.0.13-1.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"product": {
"name": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"product_id": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-servlet-api@6.0.0-5.redhat_00006.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"product_id": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-byte-buddy@1.14.18-1.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"product": {
"name": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"product_id": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-guava-libraries@33.0.0-1.jre_redhat_00002.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"product_id": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jandex@3.0.8-1.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"product": {
"name": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"product_id": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-httpcomponents-core@4.4.16-4.redhat_00010.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"product": {
"name": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"product_id": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-commons-beanutils@1.9.4-13.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"product": {
"name": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"product_id": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-eap-product-conf-parent@800.3.0-2.GA_redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"product": {
"name": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"product_id": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-httpcomponents-client@4.5.14-4.redhat_00012.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"product": {
"name": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"product_id": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wsdl4j@1.6.3-5.redhat_00008.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-openjdk-orb@10.1.0-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"product_id": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan@14.0.30-2.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"product": {
"name": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"product_id": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly@8.0.3-9.GA_redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"product": {
"name": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"product_id": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jaxb@4.0.5-2.redhat_00001.1.el8eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-mod_cluster@2.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"product_id": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-neethi@3.2.0-1.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jbossws-cxf@7.1.0-1.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-hal-console@3.6.19-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"product": {
"name": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"product_id": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-velocity@2.3.0-3.redhat_00009.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"product": {
"name": "eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"product_id": "eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-velocity-engine-core@2.3.0-3.redhat_00009.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly-elytron@2.2.6-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly-elytron-tool@2.2.6-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly-discovery-client@1.3.0-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product": {
"name": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product_id": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wss4j@3.0.3-1.redhat_00008.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product": {
"name": "eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product_id": "eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wss4j-bindings@3.0.3-1.redhat_00008.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product": {
"name": "eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product_id": "eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wss4j-policy@3.0.3-1.redhat_00008.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product": {
"name": "eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product_id": "eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wss4j-ws-security-common@3.0.3-1.redhat_00008.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product": {
"name": "eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product_id": "eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wss4j-ws-security-dom@3.0.3-1.redhat_00008.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product": {
"name": "eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product_id": "eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wss4j-ws-security-policy-stax@3.0.3-1.redhat_00008.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product": {
"name": "eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product_id": "eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wss4j-ws-security-stax@3.0.3-1.redhat_00008.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-bouncycastle@1.78.1-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-bouncycastle-jmail@1.78.1-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-bouncycastle-pg@1.78.1-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-bouncycastle-pkix@1.78.1-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-bouncycastle-prov@1.78.1-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-bouncycastle-util@1.78.1-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"product_id": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-sshd@2.12.1-2.redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"product_id": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jasypt@1.9.3-4.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-cxf@4.0.4-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-cxf-rt@4.0.4-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-cxf-services@4.0.4-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-cxf-tools@4.0.4-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"product_id": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-caffeine@3.1.8-2.redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-mime4j@0.8.11-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-mime4j-dom@0.8.11-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-mime4j-storage@0.8.11-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-angus-mail@2.0.3-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"product_id": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-java-classmate@1.5.1-3.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"product_id": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-mail@2.1.3-1.redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"product_id": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-joda-time@2.12.7-1.redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"product": {
"name": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"product_id": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-xml-security@3.0.4-1.redhat_00005.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-guava-failureaccess@1.0.2-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jsf-impl@4.0.7-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy@6.2.7-2.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-atom-provider@6.2.7-2.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-cdi@6.2.7-2.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-client@6.2.7-2.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-client-api@6.2.7-2.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-core@6.2.7-2.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-core-spi@6.2.7-2.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-crypto@6.2.7-2.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-jackson2-provider@6.2.7-2.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-jaxb-provider@6.2.7-2.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-jsapi@6.2.7-2.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-json-binding-provider@6.2.7-2.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-json-p-provider@6.2.7-2.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-multipart-provider@6.2.7-2.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-rxjava2@6.2.7-2.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-resteasy-validator-provider@6.2.7-2.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"product_id": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-yasson@3.0.3-3.redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-stax2-api@4.2.2-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty@4.1.108-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-buffer@4.1.108-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-codec@4.1.108-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-codec-dns@4.1.108-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-codec-http@4.1.108-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-codec-socks@4.1.108-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-common@4.1.108-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-handler@4.1.108-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-handler-proxy@4.1.108-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-resolver@4.1.108-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-resolver-dns@4.1.108-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-transport@4.1.108-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-transport-classes-epoll@4.1.108-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-transport-native-unix-common@4.1.108-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"product": {
"name": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"product_id": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-commons-codec@1.15.0-6.redhat_00016.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"product_id": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-commons-cli@1.4.0-2.redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"product": {
"name": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"product_id": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-angus-activation@2.0.1-3.redhat_00006.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"product": {
"name": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"product_id": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-httpcomponents-asyncclient@4.1.5-3.redhat_00005.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-reactivex-rxjava@3.1.8-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product": {
"name": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_id": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis@2.21.0-5.redhat_00052.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product": {
"name": "eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_id": "eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-cli@2.21.0-5.redhat_00052.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product": {
"name": "eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_id": "eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-commons@2.21.0-5.redhat_00052.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product": {
"name": "eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_id": "eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-core-client@2.21.0-5.redhat_00052.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product": {
"name": "eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_id": "eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-dto@2.21.0-5.redhat_00052.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product": {
"name": "eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_id": "eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-hornetq-protocol@2.21.0-5.redhat_00052.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product": {
"name": "eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_id": "eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-hqclient-protocol@2.21.0-5.redhat_00052.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product": {
"name": "eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_id": "eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-client@2.21.0-5.redhat_00052.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product": {
"name": "eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_id": "eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-ra@2.21.0-5.redhat_00052.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product": {
"name": "eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_id": "eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-server@2.21.0-5.redhat_00052.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product": {
"name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_id": "eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-service-extensions@2.21.0-5.redhat_00052.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product": {
"name": "eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_id": "eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-jdbc-store@2.21.0-5.redhat_00052.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product": {
"name": "eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_id": "eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-journal@2.21.0-5.redhat_00052.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product": {
"name": "eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_id": "eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-selector@2.21.0-5.redhat_00052.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product": {
"name": "eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_id": "eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-activemq-artemis-server@2.21.0-5.redhat_00052.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-websocket-api@2.1.1-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-websocket-client-api@2.1.1-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-xnio-transport@0.1.10-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-metadata@16.0.0-3.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-metadata-appclient@16.0.0-3.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-metadata-common@16.0.0-3.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-metadata-ear@16.0.0-3.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-metadata-ejb@16.0.0-3.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-metadata-web@16.0.0-3.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-weld-core@5.1.2-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-weld-core-impl@5.1.2-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-weld-core-jsf@5.1.2-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-weld-ejb@5.1.2-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-weld-jta@5.1.2-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-weld-lite-extension-translator@5.1.2-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-weld-web@5.1.2-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product_id": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-cxf-xjc-utils@4.0.0-5.redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product_id": "eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-cxf-xjc-boolean@4.0.0-5.redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product_id": "eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-cxf-xjc-bug986@4.0.0-5.redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product_id": "eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-cxf-xjc-dv@4.0.0-5.redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product_id": "eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-cxf-xjc-runtime@4.0.0-5.redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product_id": "eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-cxf-xjc-ts@4.0.0-5.redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml@4.2.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-core@4.2.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-profile-api@4.2.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-saml-api@4.2.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-saml-impl@4.2.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-security-api@4.2.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-security-impl@4.2.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-soap-api@4.2.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-xacml-api@4.2.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-xacml-impl@4.2.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-xacml-saml-api@4.2.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-xacml-saml-impl@4.2.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-xmlsec-api@4.2.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-opensaml-xmlsec-impl@4.2.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-hornetq@2.4.9-4.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-hornetq-commons@2.4.9-4.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-hornetq-core-client@2.4.9-4.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-hornetq-jakarta-client@2.4.9-4.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"product_id": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-json-api@2.1.3-1.redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"product_id": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-parsson@1.1.5-2.redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-xml-bind-api@4.0.1-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-slf4j@2.0.13-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-slf4j-api@2.0.13-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"product": {
"name": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"product_id": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jakarta-servlet-api@6.0.0-5.redhat_00006.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-byte-buddy@1.14.18-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-guava@33.0.0-1.jre_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"product_id": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-guava-libraries@33.0.0-1.jre_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jandex@3.0.8-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"product": {
"name": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"product_id": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-httpcomponents-core@4.4.16-4.redhat_00010.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"product_id": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-apache-commons-beanutils@1.9.4-13.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"product_id": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-eap-product-conf-parent@800.3.0-2.GA_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"product_id": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-eap-product-conf-wildfly-ee-feature-pack@800.3.0-2.GA_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"product": {
"name": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"product_id": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-httpcomponents-client@4.5.14-4.redhat_00012.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"product": {
"name": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"product_id": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wsdl4j@1.6.3-5.redhat_00008.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jboss-openjdk-orb@10.1.0-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-cachestore-jdbc-common-jakarta@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-cachestore-jdbc-jakarta@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-cachestore-remote@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-cdi-common-jakarta@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-cdi-embedded-jakarta@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-cdi-remote-jakarta@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-client-hotrod-jakarta@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-clustered-counter@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-clustered-lock@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-commons-jakarta@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-component-annotations@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-core-jakarta@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-hibernate-cache-commons@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-hibernate-cache-spi@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-hibernate-cache-v62@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-objectfilter@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-query@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-query-core@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-query-dsl@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-infinispan-remote-query-client@14.0.30-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"product_id": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly@8.0.3-9.GA_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"product_id": "eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly-java-jdk11@8.0.3-9.GA_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"product_id": "eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly-java-jdk17@8.0.3-9.GA_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"product_id": "eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-wildfly-modules@8.0.3-9.GA_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-codemodel@4.0.5-2.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jaxb@4.0.5-2.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jaxb-core@4.0.5-2.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jaxb-jxc@4.0.5-2.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jaxb-runtime@4.0.5-2.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-jaxb-xjc@4.0.5-2.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-relaxng-datatype@4.0.5-2.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-rngom@4.0.5-2.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-txw2@4.0.5-2.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_id": "eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-xsom@4.0.5-2.redhat_00001.1.el8eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"product": {
"name": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"product_id": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-transport-native-epoll@4.1.108-1.Final_redhat_00001.1.el8eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"product": {
"name": "eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"product_id": "eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap8-netty-transport-native-epoll-debuginfo@4.1.108-1.Final_redhat_00001.1.el8eap?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch"
},
"product_reference": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src"
},
"product_reference": "eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch"
},
"product_reference": "eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch"
},
"product_reference": "eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch"
},
"product_reference": "eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch"
},
"product_reference": "eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch"
},
"product_reference": "eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch"
},
"product_reference": "eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch"
},
"product_reference": "eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch"
},
"product_reference": "eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch"
},
"product_reference": "eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch"
},
"product_reference": "eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch"
},
"product_reference": "eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch"
},
"product_reference": "eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch"
},
"product_reference": "eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch"
},
"product_reference": "eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch"
},
"product_reference": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src"
},
"product_reference": "eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src"
},
"product_reference": "eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src"
},
"product_reference": "eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch"
},
"product_reference": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src"
},
"product_reference": "eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src"
},
"product_reference": "eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src"
},
"product_reference": "eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src"
},
"product_reference": "eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src"
},
"product_reference": "eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src"
},
"product_reference": "eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src"
},
"product_reference": "eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch"
},
"product_reference": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src"
},
"product_reference": "eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch"
},
"product_reference": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src"
},
"product_reference": "eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch"
},
"product_reference": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src"
},
"product_reference": "eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src"
},
"product_reference": "eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src"
},
"product_reference": "eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch"
},
"product_reference": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src"
},
"product_reference": "eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src"
},
"product_reference": "eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src"
},
"product_reference": "eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src"
},
"product_reference": "eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src"
},
"product_reference": "eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src"
},
"product_reference": "eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64"
},
"product_reference": "eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64"
},
"product_reference": "eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src"
},
"product_reference": "eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src"
},
"product_reference": "eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch"
},
"product_reference": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src"
},
"product_reference": "eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch"
},
"product_reference": "eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src"
},
"product_reference": "eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch"
},
"product_reference": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src"
},
"product_reference": "eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch"
},
"product_reference": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src"
},
"product_reference": "eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch"
},
"product_reference": "eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch"
},
"product_reference": "eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch"
},
"product_reference": "eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch"
},
"product_reference": "eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch"
},
"product_reference": "eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch"
},
"product_reference": "eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch"
},
"product_reference": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src"
},
"product_reference": "eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8",
"product_id": "8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
},
"product_reference": "eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-8.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-28752",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"discovery_date": "2024-03-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270732"
}
],
"notes": [
{
"category": "description",
"text": "A server-side request forgery (SSRF) vulnerability was found in Apache CXF. This issue occurs in attacks on webservices that take at least one parameter of any type, and when Aegisdatabind is used. Users of other data bindings including the default databinding are not impacted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates this as an Important impact due to the fact this requires Aegis databind, which is not the default databinding for Apache CXF.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-28752"
},
{
"category": "external",
"summary": "RHBZ#2270732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-28752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752"
},
{
"category": "external",
"summary": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt",
"url": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-qmgx-j96g-4428",
"url": "https://github.com/advisories/GHSA-qmgx-j96g-4428"
}
],
"release_date": "2024-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:11:43+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5479"
},
{
"category": "workaround",
"details": "No mitigation is currently available for this vulnerability. Please make sure to update as the fixes become available.",
"product_ids": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2272907"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the io.netty:netty-codec-http package. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling issues due to the accumulation of data in the HttpPostRequestDecoder. The decoder cumulates bytes in the undecodedChunk buffer until it can decode a field, allowing data to accumulate without limits. This flaw allows an attacker to cause a denial of service by sending a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData list.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty-codec-http: Allocation of Resources Without Limits or Throttling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability in io.netty:netty-codec-http, allowing for Allocation of Resources Without Limits or Throttling issues, is assessed as moderate severity due to its potential impact on system availability and performance. By exploiting the flaw in HttpPostRequestDecoder, an attacker can craft chunked POST requests with numerous small fields, causing excessive accumulation of data in memory buffers. This unrestricted accumulation can lead to significant memory consumption on the server, potentially exhausting available resources and resulting in denial of service (DoS) conditions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29025"
},
{
"category": "external",
"summary": "RHBZ#2272907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025"
},
{
"category": "external",
"summary": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3",
"url": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c",
"url": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v",
"url": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812",
"url": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812"
}
],
"release_date": "2024-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:11:43+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5479"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty-codec-http: Allocation of Resources Without Limits or Throttling"
},
{
"cve": "CVE-2024-29371",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-17T16:01:18.173727+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423194"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important as it can lead to a Denial of Service in applications that process untrusted JSON Web Encryption tokens. An attacker can craft a malicious JWE token with an exceptionally high compression ratio, causing excessive memory allocation and processing time during decompression in affected components like jose4j. This affects products such as Red Hat AMQ, Enterprise Application Platform (EAP 8.0.z, 8.1.z), Red Hat JBoss Fuse, JBoss Data Grid, OpenShift Developer Tools \u0026 Services, Red Hat build of Apache Camel, Red Hat Integration, Red Hat OpenShift Dev Spaces, Red Hat Process Automation Manager, Red Hat Single Sign-On (RH-SSO), Insights, cloud.redhat.com, and OpenShift Serverless.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "RHBZ#2423194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack",
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
}
],
"release_date": "2025-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:11:43+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5479"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression"
},
{
"cve": "CVE-2024-29857",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293028"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Bouncy Castle. An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java). Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29857"
},
{
"category": "external",
"summary": "RHBZ#2293028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29857",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29857"
}
],
"release_date": "2024-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:11:43+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5479"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service"
},
{
"acknowledgments": [
{
"names": [
"Hubert Kario"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2024-30171",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"discovery_date": "2024-04-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2276360"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Bouncy Castle Java cryptography APIs. Affected versions of the org.bouncycastle:bcprov-jdk18on package are vulnerable to Observable Timing Discrepancy via the PKCS#1 1.5 and OAEP decryption process (a.k.a. Marvin Attack). An attacker can recover cipher-texts via a side-channel attack by exploiting the Marvin security flaw. The PKCS#1 1.5 attack vector leaks data via javax.crypto.Cipher exceptions and the OAEP interface vector leaks via the bit size of the decrypted data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-30171"
},
{
"category": "external",
"summary": "RHBZ#2276360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276360"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-30171",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-30171"
},
{
"category": "external",
"summary": "https://people.redhat.com/~hkario/marvin/",
"url": "https://people.redhat.com/~hkario/marvin/"
}
],
"release_date": "2024-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:11:43+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5479"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack)"
},
{
"cve": "CVE-2024-30172",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293025"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Bouncy Castle Java Cryptography APIs. Affected versions of this package are vulnerable to an Infinite loop issue in ED25519 verification in the ScalarUtil class. This flaw allows an attacker to send a malicious signature and public key to trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-30172"
},
{
"category": "external",
"summary": "RHBZ#2293025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293025"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-30172",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-30172"
},
{
"category": "external",
"summary": "https://www.bouncycastle.org/latest_releases.html",
"url": "https://www.bouncycastle.org/latest_releases.html"
}
],
"release_date": "2024-05-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:11:43+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5479"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.21.0-5.redhat_00052.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.21.0-5.redhat_00052.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-0:2.0.3-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-angus-activation-0:2.0.1-3.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-angus-mail-0:2.0.3-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-beanutils-0:1.9.4-13.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-cli-0:1.4.0-2.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.15.0-6.redhat_00016.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.4-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.4-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-cxf-xjc-utils-0:4.0.0-5.redhat_00003.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-0:0.8.11-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-apache-mime4j-dom-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-mime4j-storage-0:0.8.11-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-apache-sshd-0:2.12.1-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-0:1.78.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-bouncycastle-jmail-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pg-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-pkix-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-prov-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-bouncycastle-util-0:1.78.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-byte-buddy-0:1.14.18-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-caffeine-0:3.1.8-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-codemodel-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-boolean-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-bug986-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-dv-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-runtime-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-cxf-xjc-ts-0:4.0.0-5.redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.3.0-2.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.3.0-2.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-failureaccess-0:1.0.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-guava-libraries-0:33.0.0-1.jre_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hal-console-0:3.6.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-0:2.4.9-4.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-hornetq-commons-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-core-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-hornetq-jakarta-client-0:2.4.9-4.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-asyncclient-0:4.1.5-3.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-client-0:4.5.14-4.redhat_00012.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-httpcomponents-core-0:4.4.16-4.redhat_00010.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-0:14.0.30-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-jdbc-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cachestore-remote-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-common-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-embedded-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-cdi-remote-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-client-hotrod-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-counter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-clustered-lock-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-commons-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-component-annotations-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-core-jakarta-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-commons-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-spi-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-hibernate-cache-v62-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-objectfilter-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-core-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-query-dsl-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-infinispan-remote-query-client-0:14.0.30-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-json-api-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-mail-0:2.1.3-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-servlet-api-0:6.0.0-5.redhat_00006.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-0:2.1.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-websocket-client-api-0:2.1.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jakarta-xml-bind-api-0:4.0.1-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jandex-0:3.0.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jasypt-0:1.9.3-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-java-classmate-0:1.5.1-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-0:4.0.5-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jaxb-core-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-jxc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-runtime-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jaxb-xjc-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-0:16.0.0-3.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jboss-metadata-appclient-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-common-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ear-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-ejb-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-metadata-web-0:16.0.0-3.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jboss-openjdk-orb-0:10.1.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jbossws-cxf-0:7.1.0-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-joda-time-0:2.12.7-1.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-jsf-impl-0:4.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-mod_cluster-0:2.0.3-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-neethi-0:3.2.0-1.redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-buffer-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-http-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-codec-socks-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-handler-proxy-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-resolver-dns-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-classes-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-epoll-debuginfo-0:4.1.108-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-8.0:eap8-netty-transport-native-unix-common-0:4.1.108-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-netty-xnio-transport-0:0.1.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-0:4.2.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-opensaml-core-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-profile-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-security-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-soap-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xacml-saml-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-api-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-opensaml-xmlsec-impl-0:4.2.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-parsson-0:1.1.5-2.redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-reactivex-rxjava-0:3.1.8-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-relaxng-datatype-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-0:6.2.7-2.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-resteasy-atom-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-cdi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-client-api-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-core-spi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-crypto-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jackson2-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jaxb-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-jsapi-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-binding-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-json-p-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-multipart-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-rxjava2-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-resteasy-validator-provider-0:6.2.7-2.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-rngom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-slf4j-0:2.0.13-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.13-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-stax2-api-0:4.2.2-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-txw2-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-velocity-0:2.3.0-3.redhat_00009.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-velocity-engine-core-0:2.3.0-3.redhat_00009.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-0:5.1.2-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-weld-core-impl-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-core-jsf-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-ejb-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-jta-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-lite-extension-translator-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-weld-web-0:5.1.2-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-0:8.0.3-9.GA_redhat_00004.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-0:1.3.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-discovery-client-0:1.3.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-0:2.2.6-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wildfly-elytron-tool-0:2.2.6-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.3-9.GA_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wsdl4j-0:1.6.3-5.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-0:3.0.3-1.redhat_00008.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-wss4j-bindings-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-policy-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-common-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-dom-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-policy-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-wss4j-ws-security-stax-0:3.0.3-1.redhat_00008.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-xml-security-0:3.0.4-1.redhat_00005.1.el8eap.src",
"8Base-JBEAP-8.0:eap8-xsom-0:4.0.5-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-8.0:eap8-yasson-0:3.0.3-3.redhat_00002.1.el8eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class"
}
]
}
RHSA-2026:10213
Vulnerability from csaf_redhat - Published: 2026-04-23 17:30 - Updated: 2026-04-29 04:36A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.
A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the "Mark temporarily offline" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user's browser.
A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.
A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.17.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.17 security update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10213",
"url": "https://access.redhat.com/errata/RHSA-2026:10213"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-29371",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27099",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27100",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33001",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/jenkins",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/jenkins"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10213.json"
}
],
"title": "Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.17 security update.",
"tracking": {
"current_release_date": "2026-04-29T04:36:21+00:00",
"generator": {
"date": "2026-04-29T04:36:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.6"
}
},
"id": "RHSA-2026:10213",
"initial_release_date": "2026-04-23T17:30:00+00:00",
"revision_history": [
{
"date": "2026-04-23T17:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-23T17:30:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T04:36:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services 4.17",
"product": {
"name": "OpenShift Developer Tools and Services 4.17",
"product_id": "OpenShift Developer Tools and Services 4.17",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.17::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Developer Tools and Services"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3A960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3A0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3A486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3A1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3Aa41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3Aab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3Acef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3Ab453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64 as a component of OpenShift Developer Tools and Services 4.17",
"product_id": "OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64 as a component of OpenShift Developer Tools and Services 4.17",
"product_id": "OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le as a component of OpenShift Developer Tools and Services 4.17",
"product_id": "OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x as a component of OpenShift Developer Tools and Services 4.17",
"product_id": "OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64 as a component of OpenShift Developer Tools and Services 4.17",
"product_id": "OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64 as a component of OpenShift Developer Tools and Services 4.17",
"product_id": "OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le as a component of OpenShift Developer Tools and Services 4.17",
"product_id": "OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x as a component of OpenShift Developer Tools and Services 4.17",
"product_id": "OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.17"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-29371",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-17T16:01:18.173727+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423194"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important as it can lead to a Denial of Service in applications that process untrusted JSON Web Encryption tokens. An attacker can craft a malicious JWE token with an exceptionally high compression ratio, causing excessive memory allocation and processing time during decompression in affected components like jose4j. This affects products such as Red Hat AMQ, Enterprise Application Platform (EAP 8.0.z, 8.1.z), Red Hat JBoss Fuse, JBoss Data Grid, OpenShift Developer Tools \u0026 Services, Red Hat build of Apache Camel, Red Hat Integration, Red Hat OpenShift Dev Spaces, Red Hat Process Automation Manager, Red Hat Single Sign-On (RH-SSO), Insights, cloud.redhat.com, and OpenShift Serverless.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "RHBZ#2423194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack",
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
}
],
"release_date": "2025-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:30:00+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.17 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10213"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression"
},
{
"cve": "CVE-2026-27099",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2026-02-18T15:02:52.012661+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440638"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the \"Mark temporarily offline\" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Jenkins allows authenticated attackers with Agent/Configure or Agent/Disconnect permissions to inject malicious scripts into the \"Mark temporarily offline\" cause description. This stored cross-site scripting (XSS) flaw can lead to information disclosure or unauthorized actions within a user\u0027s browser when viewing the affected description. Red Hat OpenShift Developer Tools \u0026 Services are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "RHBZ#2440638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440638"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27099"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669"
}
],
"release_date": "2026-02-18T14:17:43.911000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:30:00+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.17 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10213"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description"
},
{
"cve": "CVE-2026-27100",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-02-18T15:02:47.032150+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This information disclosure vulnerability in Jenkins allows an attacker with Item/Build and Item/Configure permissions to gain knowledge about the existence and display names of jobs and builds they are not authorized to access. This affects Jenkins instances in OpenShift Developer Tools \u0026 Services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "RHBZ#2440637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658"
}
],
"release_date": "2026-02-18T14:17:44.672000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:30:00+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.17 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10213"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters"
},
{
"cve": "CVE-2026-33001",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-03-18T16:02:14.310096+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448645"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "RHBZ#2448645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657",
"url": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657"
}
],
"release_date": "2026-03-18T15:15:23.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:30:00+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.17 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10213"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.17:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives"
}
]
}
RHSA-2026:10209
Vulnerability from csaf_redhat - Published: 2026-04-23 17:20 - Updated: 2026-04-29 04:36A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.
A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the "Mark temporarily offline" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user's browser.
A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.
A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.12.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.12 security update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10209",
"url": "https://access.redhat.com/errata/RHSA-2026:10209"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-29371",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27099",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27100",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33001",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.12/html/jenkins",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.12/html/jenkins"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10209.json"
}
],
"title": "Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.12 security update.",
"tracking": {
"current_release_date": "2026-04-29T04:36:20+00:00",
"generator": {
"date": "2026-04-29T04:36:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.6"
}
},
"id": "RHSA-2026:10209",
"initial_release_date": "2026-04-23T17:20:35+00:00",
"revision_history": [
{
"date": "2026-04-23T17:20:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-23T17:20:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T04:36:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services 4.12",
"product": {
"name": "OpenShift Developer Tools and Services 4.12",
"product_id": "OpenShift Developer Tools and Services 4.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.12::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Developer Tools and Services"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel8@sha256%3Aad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776760341"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel8@sha256%3A8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776764096"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel8@sha256%3A3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776760341"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel8@sha256%3A7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776760341"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel8@sha256%3A3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776760341"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64 as a component of OpenShift Developer Tools and Services 4.12",
"product_id": "OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x as a component of OpenShift Developer Tools and Services 4.12",
"product_id": "OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le as a component of OpenShift Developer Tools and Services 4.12",
"product_id": "OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64 as a component of OpenShift Developer Tools and Services 4.12",
"product_id": "OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64 as a component of OpenShift Developer Tools and Services 4.12",
"product_id": "OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-29371",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-17T16:01:18.173727+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423194"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important as it can lead to a Denial of Service in applications that process untrusted JSON Web Encryption tokens. An attacker can craft a malicious JWE token with an exceptionally high compression ratio, causing excessive memory allocation and processing time during decompression in affected components like jose4j. This affects products such as Red Hat AMQ, Enterprise Application Platform (EAP 8.0.z, 8.1.z), Red Hat JBoss Fuse, JBoss Data Grid, OpenShift Developer Tools \u0026 Services, Red Hat build of Apache Camel, Red Hat Integration, Red Hat OpenShift Dev Spaces, Red Hat Process Automation Manager, Red Hat Single Sign-On (RH-SSO), Insights, cloud.redhat.com, and OpenShift Serverless.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "RHBZ#2423194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack",
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
}
],
"release_date": "2025-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:20:35+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.12 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10209"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression"
},
{
"cve": "CVE-2026-27099",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2026-02-18T15:02:52.012661+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440638"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the \"Mark temporarily offline\" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Jenkins allows authenticated attackers with Agent/Configure or Agent/Disconnect permissions to inject malicious scripts into the \"Mark temporarily offline\" cause description. This stored cross-site scripting (XSS) flaw can lead to information disclosure or unauthorized actions within a user\u0027s browser when viewing the affected description. Red Hat OpenShift Developer Tools \u0026 Services are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "RHBZ#2440638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440638"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27099"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669"
}
],
"release_date": "2026-02-18T14:17:43.911000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:20:35+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.12 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10209"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description"
},
{
"cve": "CVE-2026-27100",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-02-18T15:02:47.032150+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This information disclosure vulnerability in Jenkins allows an attacker with Item/Build and Item/Configure permissions to gain knowledge about the existence and display names of jobs and builds they are not authorized to access. This affects Jenkins instances in OpenShift Developer Tools \u0026 Services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "RHBZ#2440637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658"
}
],
"release_date": "2026-02-18T14:17:44.672000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:20:35+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.12 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10209"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters"
},
{
"cve": "CVE-2026-33001",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-03-18T16:02:14.310096+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448645"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "RHBZ#2448645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657",
"url": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657"
}
],
"release_date": "2026-03-18T15:15:23.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:20:35+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.12 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10209"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"OpenShift Developer Tools and Services 4.12:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives"
}
]
}
RHSA-2026:10215
Vulnerability from csaf_redhat - Published: 2026-04-23 17:30 - Updated: 2026-04-29 04:36A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.
A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the "Mark temporarily offline" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user's browser.
A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.
A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.18.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.18 security update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10215",
"url": "https://access.redhat.com/errata/RHSA-2026:10215"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-29371",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27099",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27100",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33001",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/jenkins",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/jenkins"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10215.json"
}
],
"title": "Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.18 security update.",
"tracking": {
"current_release_date": "2026-04-29T04:36:22+00:00",
"generator": {
"date": "2026-04-29T04:36:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.6"
}
},
"id": "RHSA-2026:10215",
"initial_release_date": "2026-04-23T17:30:01+00:00",
"revision_history": [
{
"date": "2026-04-23T17:30:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-23T17:30:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T04:36:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services 4.18",
"product": {
"name": "OpenShift Developer Tools and Services 4.18",
"product_id": "OpenShift Developer Tools and Services 4.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.18::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Developer Tools and Services"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3A960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3A0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3A486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3A1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3Aa41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3Aab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3Acef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3Ab453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64 as a component of OpenShift Developer Tools and Services 4.18",
"product_id": "OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64 as a component of OpenShift Developer Tools and Services 4.18",
"product_id": "OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le as a component of OpenShift Developer Tools and Services 4.18",
"product_id": "OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x as a component of OpenShift Developer Tools and Services 4.18",
"product_id": "OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64 as a component of OpenShift Developer Tools and Services 4.18",
"product_id": "OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64 as a component of OpenShift Developer Tools and Services 4.18",
"product_id": "OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le as a component of OpenShift Developer Tools and Services 4.18",
"product_id": "OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x as a component of OpenShift Developer Tools and Services 4.18",
"product_id": "OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.18"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-29371",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-17T16:01:18.173727+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423194"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important as it can lead to a Denial of Service in applications that process untrusted JSON Web Encryption tokens. An attacker can craft a malicious JWE token with an exceptionally high compression ratio, causing excessive memory allocation and processing time during decompression in affected components like jose4j. This affects products such as Red Hat AMQ, Enterprise Application Platform (EAP 8.0.z, 8.1.z), Red Hat JBoss Fuse, JBoss Data Grid, OpenShift Developer Tools \u0026 Services, Red Hat build of Apache Camel, Red Hat Integration, Red Hat OpenShift Dev Spaces, Red Hat Process Automation Manager, Red Hat Single Sign-On (RH-SSO), Insights, cloud.redhat.com, and OpenShift Serverless.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "RHBZ#2423194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack",
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
}
],
"release_date": "2025-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:30:01+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.18 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10215"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression"
},
{
"cve": "CVE-2026-27099",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2026-02-18T15:02:52.012661+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440638"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the \"Mark temporarily offline\" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Jenkins allows authenticated attackers with Agent/Configure or Agent/Disconnect permissions to inject malicious scripts into the \"Mark temporarily offline\" cause description. This stored cross-site scripting (XSS) flaw can lead to information disclosure or unauthorized actions within a user\u0027s browser when viewing the affected description. Red Hat OpenShift Developer Tools \u0026 Services are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "RHBZ#2440638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440638"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27099"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669"
}
],
"release_date": "2026-02-18T14:17:43.911000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:30:01+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.18 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10215"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description"
},
{
"cve": "CVE-2026-27100",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-02-18T15:02:47.032150+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This information disclosure vulnerability in Jenkins allows an attacker with Item/Build and Item/Configure permissions to gain knowledge about the existence and display names of jobs and builds they are not authorized to access. This affects Jenkins instances in OpenShift Developer Tools \u0026 Services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "RHBZ#2440637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658"
}
],
"release_date": "2026-02-18T14:17:44.672000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:30:01+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.18 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10215"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters"
},
{
"cve": "CVE-2026-33001",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-03-18T16:02:14.310096+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448645"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "RHBZ#2448645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657",
"url": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657"
}
],
"release_date": "2026-03-18T15:15:23.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:30:01+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.18 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10215"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.18:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives"
}
]
}
RHSA-2026:10204
Vulnerability from csaf_redhat - Published: 2026-04-23 16:56 - Updated: 2026-04-29 04:36A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.
A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the "Mark temporarily offline" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user's browser.
A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.
A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.15.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.15 security update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10204",
"url": "https://access.redhat.com/errata/RHSA-2026:10204"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-29371",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27099",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27100",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33001",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.15/html/jenkins",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.15/html/jenkins"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10204.json"
}
],
"title": "Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.15 security update.",
"tracking": {
"current_release_date": "2026-04-29T04:36:19+00:00",
"generator": {
"date": "2026-04-29T04:36:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.6"
}
},
"id": "RHSA-2026:10204",
"initial_release_date": "2026-04-23T16:56:17+00:00",
"revision_history": [
{
"date": "2026-04-23T16:56:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-23T16:56:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T04:36:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services 4.15",
"product": {
"name": "OpenShift Developer Tools and Services 4.15",
"product_id": "OpenShift Developer Tools and Services 4.15",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.15::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Developer Tools and Services"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel8@sha256%3Aad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776760341"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel8@sha256%3A5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776762347"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel8@sha256%3A3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776760341"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel8@sha256%3Aec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776762347"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel8@sha256%3A7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776760341"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel8@sha256%3A02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776762347"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel8@sha256%3A3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776760341"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel8@sha256%3Afa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776762347"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64 as a component of OpenShift Developer Tools and Services 4.15",
"product_id": "OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x as a component of OpenShift Developer Tools and Services 4.15",
"product_id": "OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le as a component of OpenShift Developer Tools and Services 4.15",
"product_id": "OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64 as a component of OpenShift Developer Tools and Services 4.15",
"product_id": "OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le as a component of OpenShift Developer Tools and Services 4.15",
"product_id": "OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64 as a component of OpenShift Developer Tools and Services 4.15",
"product_id": "OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64 as a component of OpenShift Developer Tools and Services 4.15",
"product_id": "OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x as a component of OpenShift Developer Tools and Services 4.15",
"product_id": "OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-29371",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-17T16:01:18.173727+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423194"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important as it can lead to a Denial of Service in applications that process untrusted JSON Web Encryption tokens. An attacker can craft a malicious JWE token with an exceptionally high compression ratio, causing excessive memory allocation and processing time during decompression in affected components like jose4j. This affects products such as Red Hat AMQ, Enterprise Application Platform (EAP 8.0.z, 8.1.z), Red Hat JBoss Fuse, JBoss Data Grid, OpenShift Developer Tools \u0026 Services, Red Hat build of Apache Camel, Red Hat Integration, Red Hat OpenShift Dev Spaces, Red Hat Process Automation Manager, Red Hat Single Sign-On (RH-SSO), Insights, cloud.redhat.com, and OpenShift Serverless.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "RHBZ#2423194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack",
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
}
],
"release_date": "2025-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T16:56:17+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.15 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression"
},
{
"cve": "CVE-2026-27099",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2026-02-18T15:02:52.012661+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440638"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the \"Mark temporarily offline\" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Jenkins allows authenticated attackers with Agent/Configure or Agent/Disconnect permissions to inject malicious scripts into the \"Mark temporarily offline\" cause description. This stored cross-site scripting (XSS) flaw can lead to information disclosure or unauthorized actions within a user\u0027s browser when viewing the affected description. Red Hat OpenShift Developer Tools \u0026 Services are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "RHBZ#2440638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440638"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27099"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669"
}
],
"release_date": "2026-02-18T14:17:43.911000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T16:56:17+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.15 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description"
},
{
"cve": "CVE-2026-27100",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-02-18T15:02:47.032150+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This information disclosure vulnerability in Jenkins allows an attacker with Item/Build and Item/Configure permissions to gain knowledge about the existence and display names of jobs and builds they are not authorized to access. This affects Jenkins instances in OpenShift Developer Tools \u0026 Services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "RHBZ#2440637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658"
}
],
"release_date": "2026-02-18T14:17:44.672000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T16:56:17+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.15 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters"
},
{
"cve": "CVE-2026-33001",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-03-18T16:02:14.310096+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448645"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "RHBZ#2448645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657",
"url": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657"
}
],
"release_date": "2026-03-18T15:15:23.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T16:56:17+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.15 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.15:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives"
}
]
}
RHSA-2026:10205
Vulnerability from csaf_redhat - Published: 2026-04-23 17:06 - Updated: 2026-04-29 04:36A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.
A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the "Mark temporarily offline" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user's browser.
A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.
A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.20.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.20 security update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10205",
"url": "https://access.redhat.com/errata/RHSA-2026:10205"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-29371",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27099",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27100",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33001",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/jenkins",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/jenkins"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10205.json"
}
],
"title": "Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.20 security update.",
"tracking": {
"current_release_date": "2026-04-29T04:36:25+00:00",
"generator": {
"date": "2026-04-29T04:36:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.6"
}
},
"id": "RHSA-2026:10205",
"initial_release_date": "2026-04-23T17:06:07+00:00",
"revision_history": [
{
"date": "2026-04-23T17:06:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-23T17:06:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T04:36:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services 4.2",
"product": {
"name": "OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.20::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Developer Tools and Services"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3A960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3A0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3A486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3A1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3Aa41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3Aab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3Acef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3Ab453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64 as a component of OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64 as a component of OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le as a component of OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x as a component of OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64 as a component of OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64 as a component of OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le as a component of OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x as a component of OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-29371",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-17T16:01:18.173727+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423194"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important as it can lead to a Denial of Service in applications that process untrusted JSON Web Encryption tokens. An attacker can craft a malicious JWE token with an exceptionally high compression ratio, causing excessive memory allocation and processing time during decompression in affected components like jose4j. This affects products such as Red Hat AMQ, Enterprise Application Platform (EAP 8.0.z, 8.1.z), Red Hat JBoss Fuse, JBoss Data Grid, OpenShift Developer Tools \u0026 Services, Red Hat build of Apache Camel, Red Hat Integration, Red Hat OpenShift Dev Spaces, Red Hat Process Automation Manager, Red Hat Single Sign-On (RH-SSO), Insights, cloud.redhat.com, and OpenShift Serverless.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "RHBZ#2423194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack",
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
}
],
"release_date": "2025-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:06:07+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.20 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression"
},
{
"cve": "CVE-2026-27099",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2026-02-18T15:02:52.012661+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440638"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the \"Mark temporarily offline\" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Jenkins allows authenticated attackers with Agent/Configure or Agent/Disconnect permissions to inject malicious scripts into the \"Mark temporarily offline\" cause description. This stored cross-site scripting (XSS) flaw can lead to information disclosure or unauthorized actions within a user\u0027s browser when viewing the affected description. Red Hat OpenShift Developer Tools \u0026 Services are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "RHBZ#2440638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440638"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27099"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669"
}
],
"release_date": "2026-02-18T14:17:43.911000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:06:07+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.20 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description"
},
{
"cve": "CVE-2026-27100",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-02-18T15:02:47.032150+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This information disclosure vulnerability in Jenkins allows an attacker with Item/Build and Item/Configure permissions to gain knowledge about the existence and display names of jobs and builds they are not authorized to access. This affects Jenkins instances in OpenShift Developer Tools \u0026 Services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "RHBZ#2440637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658"
}
],
"release_date": "2026-02-18T14:17:44.672000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:06:07+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.20 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters"
},
{
"cve": "CVE-2026-33001",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-03-18T16:02:14.310096+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448645"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "RHBZ#2448645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657",
"url": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657"
}
],
"release_date": "2026-03-18T15:15:23.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:06:07+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.20 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives"
}
]
}
RHSA-2026:10214
Vulnerability from csaf_redhat - Published: 2026-04-23 17:30 - Updated: 2026-04-29 04:36A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.
A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the "Mark temporarily offline" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user's browser.
A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.
A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.16.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.16 security update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10214",
"url": "https://access.redhat.com/errata/RHSA-2026:10214"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-29371",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27099",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27100",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33001",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.16/html/jenkins",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.16/html/jenkins"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10214.json"
}
],
"title": "Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.16 security update.",
"tracking": {
"current_release_date": "2026-04-29T04:36:21+00:00",
"generator": {
"date": "2026-04-29T04:36:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.6"
}
},
"id": "RHSA-2026:10214",
"initial_release_date": "2026-04-23T17:30:02+00:00",
"revision_history": [
{
"date": "2026-04-23T17:30:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-23T17:30:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T04:36:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services 4.16",
"product": {
"name": "OpenShift Developer Tools and Services 4.16",
"product_id": "OpenShift Developer Tools and Services 4.16",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.16::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Developer Tools and Services"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3A960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3A0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3A486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3A1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3Aa41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3Aab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3Acef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3Ab453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64 as a component of OpenShift Developer Tools and Services 4.16",
"product_id": "OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64 as a component of OpenShift Developer Tools and Services 4.16",
"product_id": "OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le as a component of OpenShift Developer Tools and Services 4.16",
"product_id": "OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x as a component of OpenShift Developer Tools and Services 4.16",
"product_id": "OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64 as a component of OpenShift Developer Tools and Services 4.16",
"product_id": "OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64 as a component of OpenShift Developer Tools and Services 4.16",
"product_id": "OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le as a component of OpenShift Developer Tools and Services 4.16",
"product_id": "OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x as a component of OpenShift Developer Tools and Services 4.16",
"product_id": "OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.16"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-29371",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-17T16:01:18.173727+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423194"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important as it can lead to a Denial of Service in applications that process untrusted JSON Web Encryption tokens. An attacker can craft a malicious JWE token with an exceptionally high compression ratio, causing excessive memory allocation and processing time during decompression in affected components like jose4j. This affects products such as Red Hat AMQ, Enterprise Application Platform (EAP 8.0.z, 8.1.z), Red Hat JBoss Fuse, JBoss Data Grid, OpenShift Developer Tools \u0026 Services, Red Hat build of Apache Camel, Red Hat Integration, Red Hat OpenShift Dev Spaces, Red Hat Process Automation Manager, Red Hat Single Sign-On (RH-SSO), Insights, cloud.redhat.com, and OpenShift Serverless.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "RHBZ#2423194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack",
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
}
],
"release_date": "2025-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:30:02+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.16 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10214"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression"
},
{
"cve": "CVE-2026-27099",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2026-02-18T15:02:52.012661+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440638"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the \"Mark temporarily offline\" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Jenkins allows authenticated attackers with Agent/Configure or Agent/Disconnect permissions to inject malicious scripts into the \"Mark temporarily offline\" cause description. This stored cross-site scripting (XSS) flaw can lead to information disclosure or unauthorized actions within a user\u0027s browser when viewing the affected description. Red Hat OpenShift Developer Tools \u0026 Services are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "RHBZ#2440638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440638"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27099"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669"
}
],
"release_date": "2026-02-18T14:17:43.911000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:30:02+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.16 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10214"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description"
},
{
"cve": "CVE-2026-27100",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-02-18T15:02:47.032150+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This information disclosure vulnerability in Jenkins allows an attacker with Item/Build and Item/Configure permissions to gain knowledge about the existence and display names of jobs and builds they are not authorized to access. This affects Jenkins instances in OpenShift Developer Tools \u0026 Services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "RHBZ#2440637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658"
}
],
"release_date": "2026-02-18T14:17:44.672000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:30:02+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.16 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10214"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters"
},
{
"cve": "CVE-2026-33001",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-03-18T16:02:14.310096+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448645"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "RHBZ#2448645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657",
"url": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657"
}
],
"release_date": "2026-03-18T15:15:23.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:30:02+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.16 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10214"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.16:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives"
}
]
}
RHSA-2026:10206
Vulnerability from csaf_redhat - Published: 2026-04-23 17:15 - Updated: 2026-04-29 04:36A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.
A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the "Mark temporarily offline" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user's browser.
A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.
A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.19.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.19 security update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10206",
"url": "https://access.redhat.com/errata/RHSA-2026:10206"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-29371",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27099",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27100",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33001",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/jenkins",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/jenkins"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10206.json"
}
],
"title": "Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.19 security update.",
"tracking": {
"current_release_date": "2026-04-29T04:36:20+00:00",
"generator": {
"date": "2026-04-29T04:36:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.6"
}
},
"id": "RHSA-2026:10206",
"initial_release_date": "2026-04-23T17:15:37+00:00",
"revision_history": [
{
"date": "2026-04-23T17:15:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-23T17:15:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T04:36:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services 4.19",
"product": {
"name": "OpenShift Developer Tools and Services 4.19",
"product_id": "OpenShift Developer Tools and Services 4.19",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.19::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Developer Tools and Services"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3A960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3A0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3A486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3A1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3Aa41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3Aab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3Acef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3Ab453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64 as a component of OpenShift Developer Tools and Services 4.19",
"product_id": "OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64 as a component of OpenShift Developer Tools and Services 4.19",
"product_id": "OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le as a component of OpenShift Developer Tools and Services 4.19",
"product_id": "OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x as a component of OpenShift Developer Tools and Services 4.19",
"product_id": "OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64 as a component of OpenShift Developer Tools and Services 4.19",
"product_id": "OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64 as a component of OpenShift Developer Tools and Services 4.19",
"product_id": "OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le as a component of OpenShift Developer Tools and Services 4.19",
"product_id": "OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x as a component of OpenShift Developer Tools and Services 4.19",
"product_id": "OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.19"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-29371",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-17T16:01:18.173727+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423194"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important as it can lead to a Denial of Service in applications that process untrusted JSON Web Encryption tokens. An attacker can craft a malicious JWE token with an exceptionally high compression ratio, causing excessive memory allocation and processing time during decompression in affected components like jose4j. This affects products such as Red Hat AMQ, Enterprise Application Platform (EAP 8.0.z, 8.1.z), Red Hat JBoss Fuse, JBoss Data Grid, OpenShift Developer Tools \u0026 Services, Red Hat build of Apache Camel, Red Hat Integration, Red Hat OpenShift Dev Spaces, Red Hat Process Automation Manager, Red Hat Single Sign-On (RH-SSO), Insights, cloud.redhat.com, and OpenShift Serverless.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "RHBZ#2423194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack",
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
}
],
"release_date": "2025-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:15:37+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.19 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression"
},
{
"cve": "CVE-2026-27099",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2026-02-18T15:02:52.012661+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440638"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the \"Mark temporarily offline\" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Jenkins allows authenticated attackers with Agent/Configure or Agent/Disconnect permissions to inject malicious scripts into the \"Mark temporarily offline\" cause description. This stored cross-site scripting (XSS) flaw can lead to information disclosure or unauthorized actions within a user\u0027s browser when viewing the affected description. Red Hat OpenShift Developer Tools \u0026 Services are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "RHBZ#2440638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440638"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27099"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669"
}
],
"release_date": "2026-02-18T14:17:43.911000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:15:37+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.19 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description"
},
{
"cve": "CVE-2026-27100",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-02-18T15:02:47.032150+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This information disclosure vulnerability in Jenkins allows an attacker with Item/Build and Item/Configure permissions to gain knowledge about the existence and display names of jobs and builds they are not authorized to access. This affects Jenkins instances in OpenShift Developer Tools \u0026 Services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "RHBZ#2440637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658"
}
],
"release_date": "2026-02-18T14:17:44.672000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:15:37+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.19 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters"
},
{
"cve": "CVE-2026-33001",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-03-18T16:02:14.310096+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448645"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "RHBZ#2448645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657",
"url": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657"
}
],
"release_date": "2026-03-18T15:15:23.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:15:37+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.19 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.19:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives"
}
]
}
RHSA-2026:10211
Vulnerability from csaf_redhat - Published: 2026-04-23 17:21 - Updated: 2026-04-29 04:36A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.
A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the "Mark temporarily offline" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user's browser.
A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.
A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.14.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.14 security update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10211",
"url": "https://access.redhat.com/errata/RHSA-2026:10211"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-29371",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27099",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27100",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33001",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html/jenkins",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html/jenkins"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10211.json"
}
],
"title": "Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.14 security update.",
"tracking": {
"current_release_date": "2026-04-29T04:36:21+00:00",
"generator": {
"date": "2026-04-29T04:36:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.6"
}
},
"id": "RHSA-2026:10211",
"initial_release_date": "2026-04-23T17:21:09+00:00",
"revision_history": [
{
"date": "2026-04-23T17:21:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-23T17:21:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T04:36:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services 4.14",
"product": {
"name": "OpenShift Developer Tools and Services 4.14",
"product_id": "OpenShift Developer Tools and Services 4.14",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.14::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Developer Tools and Services"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel8@sha256%3Aad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776760341"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel8@sha256%3A5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776762347"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel8@sha256%3A3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776760341"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel8@sha256%3Aec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776762347"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel8@sha256%3A7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776760341"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel8@sha256%3A02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776762347"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel8@sha256%3A3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776760341"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel8@sha256%3Afa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776762347"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64 as a component of OpenShift Developer Tools and Services 4.14",
"product_id": "OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x as a component of OpenShift Developer Tools and Services 4.14",
"product_id": "OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le as a component of OpenShift Developer Tools and Services 4.14",
"product_id": "OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64 as a component of OpenShift Developer Tools and Services 4.14",
"product_id": "OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le as a component of OpenShift Developer Tools and Services 4.14",
"product_id": "OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64 as a component of OpenShift Developer Tools and Services 4.14",
"product_id": "OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64 as a component of OpenShift Developer Tools and Services 4.14",
"product_id": "OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x as a component of OpenShift Developer Tools and Services 4.14",
"product_id": "OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.14"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-29371",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-17T16:01:18.173727+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423194"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important as it can lead to a Denial of Service in applications that process untrusted JSON Web Encryption tokens. An attacker can craft a malicious JWE token with an exceptionally high compression ratio, causing excessive memory allocation and processing time during decompression in affected components like jose4j. This affects products such as Red Hat AMQ, Enterprise Application Platform (EAP 8.0.z, 8.1.z), Red Hat JBoss Fuse, JBoss Data Grid, OpenShift Developer Tools \u0026 Services, Red Hat build of Apache Camel, Red Hat Integration, Red Hat OpenShift Dev Spaces, Red Hat Process Automation Manager, Red Hat Single Sign-On (RH-SSO), Insights, cloud.redhat.com, and OpenShift Serverless.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "RHBZ#2423194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack",
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
}
],
"release_date": "2025-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:21:09+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.14 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10211"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression"
},
{
"cve": "CVE-2026-27099",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2026-02-18T15:02:52.012661+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440638"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the \"Mark temporarily offline\" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Jenkins allows authenticated attackers with Agent/Configure or Agent/Disconnect permissions to inject malicious scripts into the \"Mark temporarily offline\" cause description. This stored cross-site scripting (XSS) flaw can lead to information disclosure or unauthorized actions within a user\u0027s browser when viewing the affected description. Red Hat OpenShift Developer Tools \u0026 Services are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "RHBZ#2440638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440638"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27099"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669"
}
],
"release_date": "2026-02-18T14:17:43.911000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:21:09+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.14 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10211"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description"
},
{
"cve": "CVE-2026-27100",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-02-18T15:02:47.032150+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This information disclosure vulnerability in Jenkins allows an attacker with Item/Build and Item/Configure permissions to gain knowledge about the existence and display names of jobs and builds they are not authorized to access. This affects Jenkins instances in OpenShift Developer Tools \u0026 Services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "RHBZ#2440637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658"
}
],
"release_date": "2026-02-18T14:17:44.672000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:21:09+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.14 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10211"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters"
},
{
"cve": "CVE-2026-33001",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-03-18T16:02:14.310096+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448645"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "RHBZ#2448645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657",
"url": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657"
}
],
"release_date": "2026-03-18T15:15:23.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T17:21:09+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.14 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10211"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:02c954e1692ff2ce7c85c1505fe48e65b2b21b2f368d514fca86343f4f96cd7c_ppc64le",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:5957dae25e049ae63fd5112da7436c9c1b0a6deefe5ebc6ae11b4e78c75cfe3d_amd64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:ec218eaf3b8668c6473232a695ce742b8b8dc57274ec5fc727c996df812d5aae_arm64",
"OpenShift Developer Tools and Services 4.14:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:fa8f511929707eed40f5d9baf9ca89dfb8d46913746f2c0e4bd97d0b02d5d2b8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives"
}
]
}
RHSA-2026:10201
Vulnerability from csaf_redhat - Published: 2026-04-23 16:39 - Updated: 2026-04-29 04:36A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.
A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the "Mark temporarily offline" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user's browser.
A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.
A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.13.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.13 security update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10201",
"url": "https://access.redhat.com/errata/RHSA-2026:10201"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-29371",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27099",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27100",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33001",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.13/html/jenkins",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.13/html/jenkins"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10201.json"
}
],
"title": "Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.13 security update.",
"tracking": {
"current_release_date": "2026-04-29T04:36:19+00:00",
"generator": {
"date": "2026-04-29T04:36:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.6"
}
},
"id": "RHSA-2026:10201",
"initial_release_date": "2026-04-23T16:39:39+00:00",
"revision_history": [
{
"date": "2026-04-23T16:39:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-23T16:39:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T04:36:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services 4.13",
"product": {
"name": "OpenShift Developer Tools and Services 4.13",
"product_id": "OpenShift Developer Tools and Services 4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.13::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Developer Tools and Services"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel8@sha256%3Aad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776760341"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel8@sha256%3A8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776764096"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel8@sha256%3A3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776760341"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel8@sha256%3A7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776760341"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel8@sha256%3A3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776760341"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64 as a component of OpenShift Developer Tools and Services 4.13",
"product_id": "OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x as a component of OpenShift Developer Tools and Services 4.13",
"product_id": "OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le as a component of OpenShift Developer Tools and Services 4.13",
"product_id": "OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64 as a component of OpenShift Developer Tools and Services 4.13",
"product_id": "OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64 as a component of OpenShift Developer Tools and Services 4.13",
"product_id": "OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.13"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-29371",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-17T16:01:18.173727+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423194"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important as it can lead to a Denial of Service in applications that process untrusted JSON Web Encryption tokens. An attacker can craft a malicious JWE token with an exceptionally high compression ratio, causing excessive memory allocation and processing time during decompression in affected components like jose4j. This affects products such as Red Hat AMQ, Enterprise Application Platform (EAP 8.0.z, 8.1.z), Red Hat JBoss Fuse, JBoss Data Grid, OpenShift Developer Tools \u0026 Services, Red Hat build of Apache Camel, Red Hat Integration, Red Hat OpenShift Dev Spaces, Red Hat Process Automation Manager, Red Hat Single Sign-On (RH-SSO), Insights, cloud.redhat.com, and OpenShift Serverless.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "RHBZ#2423194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack",
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
}
],
"release_date": "2025-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T16:39:39+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.13 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10201"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression"
},
{
"cve": "CVE-2026-27099",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2026-02-18T15:02:52.012661+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440638"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the \"Mark temporarily offline\" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Jenkins allows authenticated attackers with Agent/Configure or Agent/Disconnect permissions to inject malicious scripts into the \"Mark temporarily offline\" cause description. This stored cross-site scripting (XSS) flaw can lead to information disclosure or unauthorized actions within a user\u0027s browser when viewing the affected description. Red Hat OpenShift Developer Tools \u0026 Services are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "RHBZ#2440638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440638"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27099"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669"
}
],
"release_date": "2026-02-18T14:17:43.911000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T16:39:39+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.13 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10201"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description"
},
{
"cve": "CVE-2026-27100",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-02-18T15:02:47.032150+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This information disclosure vulnerability in Jenkins allows an attacker with Item/Build and Item/Configure permissions to gain knowledge about the existence and display names of jobs and builds they are not authorized to access. This affects Jenkins instances in OpenShift Developer Tools \u0026 Services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "RHBZ#2440637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658"
}
],
"release_date": "2026-02-18T14:17:44.672000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T16:39:39+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.13 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10201"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters"
},
{
"cve": "CVE-2026-33001",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-03-18T16:02:14.310096+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448645"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "RHBZ#2448645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657",
"url": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657"
}
],
"release_date": "2026-03-18T15:15:23.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T16:39:39+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.13 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10201"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3959cf6c1b1b5e7b2c33ef49ebe1e99dfce7e10ad14ea0c948c3365249f85230_arm64",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:3c83e451aa4a676671e22a6c91539311d04677601978d35032bce45e10c63a39_s390x",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:7bff04aabb5d39075f92b8e65d2cfebc02cfd80488037685654a1e1cbf0b2056_ppc64le",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8@sha256:ad63a7e895c432b05a4fab3357cf1a8ab8c99a1f6bc1e86abd2c67f4f1e9a872_amd64",
"OpenShift Developer Tools and Services 4.13:registry.redhat.io/ocp-tools-4/jenkins-rhel8@sha256:8b5e1f1b924de7b31a2856c84548a1369b433170205175ce65faa0d61aaae0a7_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives"
}
]
}
RHSA-2025:17299
Vulnerability from csaf_redhat - Published: 2025-10-02 14:54 - Updated: 2026-04-29 04:36A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.
A flaw was found in org.apache.cxf/cxf, where untrusted users can configure JMS to allow the specification of RMI or LDAP URLs, possibly leading to code execution. This vulnerability allows an attacker to provide malicious protocol URLs during JMS configuration.
A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).
A flaw in Netty’s HTTP/1.1 chunked encoding parser allows newline (LF) characters in chunk extensions to be incorrectly treated as the end of the chunk-size line instead of requiring the proper CRLF sequence. This discrepancy can be exploited in rare cases where a reverse proxy interprets the same input differently, potentially enabling HTTP request smuggling attacks such as bypassing access controls or corrupting responses.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 8.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly application runtime.\n\nThis asynchronous patch is an update for Red Hat JBoss Enterprise Application Platform 8.1. See Release Notes for information about the most\nsignificant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* netty-codec-http: Netty is vulnerable to request smuggling due to incorrect parsing of chunk extensions [eap-8.1.z] (CVE-2025-58056)\n\n* netty-codec-http2: Netty is vulnerable to request smuggling due to incorrect parsing of chunk extensions [eap-8.1.z] (CVE-2025-58056)\n\n* cxf: CXF JMS Code Execution Vulnerability [eap-8.1.z] (CVE-2025-48913)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:17299",
"url": "https://access.redhat.com/errata/RHSA-2025:17299"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/8.1",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/8.1"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/7129481",
"url": "https://access.redhat.com/articles/7129481"
},
{
"category": "external",
"summary": "2388252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388252"
},
{
"category": "external",
"summary": "2392996",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392996"
},
{
"category": "external",
"summary": "JBEAP-30701",
"url": "https://issues.redhat.com/browse/JBEAP-30701"
},
{
"category": "external",
"summary": "JBEAP-30732",
"url": "https://issues.redhat.com/browse/JBEAP-30732"
},
{
"category": "external",
"summary": "JBEAP-30759",
"url": "https://issues.redhat.com/browse/JBEAP-30759"
},
{
"category": "external",
"summary": "JBEAP-30761",
"url": "https://issues.redhat.com/browse/JBEAP-30761"
},
{
"category": "external",
"summary": "JBEAP-30763",
"url": "https://issues.redhat.com/browse/JBEAP-30763"
},
{
"category": "external",
"summary": "JBEAP-30887",
"url": "https://issues.redhat.com/browse/JBEAP-30887"
},
{
"category": "external",
"summary": "JBEAP-30889",
"url": "https://issues.redhat.com/browse/JBEAP-30889"
},
{
"category": "external",
"summary": "JBEAP-30891",
"url": "https://issues.redhat.com/browse/JBEAP-30891"
},
{
"category": "external",
"summary": "JBEAP-30916",
"url": "https://issues.redhat.com/browse/JBEAP-30916"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_17299.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.1.0 security update",
"tracking": {
"current_release_date": "2026-04-29T04:36:17+00:00",
"generator": {
"date": "2026-04-29T04:36:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.6"
}
},
"id": "RHSA-2025:17299",
"initial_release_date": "2025-10-02T14:54:02+00:00",
"revision_history": [
{
"date": "2025-10-02T14:54:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-02T14:54:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T04:36:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 8.1.0",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 8.1.0",
"product_id": "Red Hat JBoss Enterprise Application Platform 8.1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:8.1::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-29371",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-17T16:01:18.173727+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423194"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important as it can lead to a Denial of Service in applications that process untrusted JSON Web Encryption tokens. An attacker can craft a malicious JWE token with an exceptionally high compression ratio, causing excessive memory allocation and processing time during decompression in affected components like jose4j. This affects products such as Red Hat AMQ, Enterprise Application Platform (EAP 8.0.z, 8.1.z), Red Hat JBoss Fuse, JBoss Data Grid, OpenShift Developer Tools \u0026 Services, Red Hat build of Apache Camel, Red Hat Integration, Red Hat OpenShift Dev Spaces, Red Hat Process Automation Manager, Red Hat Single Sign-On (RH-SSO), Insights, cloud.redhat.com, and OpenShift Serverless.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 8.1.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "RHBZ#2423194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack",
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
}
],
"release_date": "2025-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-02T14:54:02+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 8.1.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:17299"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 8.1.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression"
},
{
"cve": "CVE-2025-48913",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-08-08T10:00:54.007824+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2387221"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in org.apache.cxf/cxf, where untrusted users can configure JMS to allow the specification of RMI or LDAP URLs, possibly leading to code execution. This vulnerability allows an attacker to provide malicious protocol URLs during JMS configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.apache.cxf/cxf: CXF JMS Code Execution Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw should be considered Important because the impact goes beyond a simple denial of service or configuration misuse. By allowing untrusted users to configure JMS with RMI or LDAP URLs, attackers could achieve remote code execution by loading attacker-controlled classes or objects. Although this requires the precondition that the attacker has access to JMS configuration, in many enterprise deployments this may be exposed through integration layers or misconfigured permissions, making the attack surface broader than a purely local or limited-scope scenario.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 8.1.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-48913"
},
{
"category": "external",
"summary": "RHBZ#2387221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387221"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-48913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48913"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/f1nv488ztc0js4g5ml2v88mzkzslyh83",
"url": "https://lists.apache.org/thread/f1nv488ztc0js4g5ml2v88mzkzslyh83"
}
],
"release_date": "2025-08-08T09:21:22.208000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-02T14:54:02+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 8.1.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:17299"
},
{
"category": "workaround",
"details": "To reduce risk, deployments should restrict the allowed protocols in JMS configuration to trusted and expected values only. In particular, disallow the use of rmi:// and ldap:// URLs, which could be abused for remote class loading and code execution.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 8.1.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 8.1.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "org.apache.cxf/cxf: CXF JMS Code Execution Vulnerability"
},
{
"cve": "CVE-2025-55163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-08-13T15:01:55.372237+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2388252"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the \"MadeYouReset\" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated with an Important severity. It is simple to exploit because it does not require authentication and could result in a denial of service (DoS). While some DoS flaws are classified as Moderate, \u201cMadeYouReset\u201d is Important because of the limited barriers (no specialized tooling or advanced scripting) to exploitation, which directly impacts service availability. The vulnerability arises from an implementation weakness in HTTP/2 stream reset handling \u2014 malformed client requests can trigger server-side resets without incrementing abuse counters, allowing an attacker to bypass built-in request throttling and overhead limits. Since these resets consume CPU and memory resources and can be generated at scale over a single TCP/TLS connection, a remote attacker could exhaust server capacity quickly, impacting all legitimate clients.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 8.1.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55163"
},
{
"category": "external",
"summary": "RHBZ#2388252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55163",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55163"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4",
"url": "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/767506",
"url": "https://kb.cert.org/vuls/id/767506"
}
],
"release_date": "2025-08-13T14:17:36.111000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-02T14:54:02+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 8.1.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:17299"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 8.1.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 8.1.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability"
},
{
"cve": "CVE-2025-58056",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2025-09-03T21:01:22.935850+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2392996"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in Netty\u2019s HTTP/1.1 chunked encoding parser allows newline (LF) characters in chunk extensions to be incorrectly treated as the end of the chunk-size line instead of requiring the proper CRLF sequence. This discrepancy can be exploited in rare cases where a reverse proxy interprets the same input differently, potentially enabling HTTP request smuggling attacks such as bypassing access controls or corrupting responses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty-codec-http: Netty is vulnerable to request smuggling due to incorrect parsing of chunk extensions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is considered Moderate rather than Important because successful exploitation depends on a very specific deployment condition: the presence of an intermediary reverse proxy that both mishandles lone LF characters in chunk extensions and forwards them unmodified to Netty. By itself, Netty\u2019s parsing quirk does not introduce risk, and in most real-world environments, reverse proxies normalize or reject malformed chunked requests, preventing smuggling. As a result, the vulnerability has limited reach, requires a niche configuration to be exploitable, and does not universally expose Netty-based servers to request smuggling\u2014hence it is rated moderate in severity rather than important or critical.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 8.1.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58056"
},
{
"category": "external",
"summary": "RHBZ#2392996",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392996"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58056",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58056"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc9112#name-chunked-transfer-coding",
"url": "https://datatracker.ietf.org/doc/html/rfc9112#name-chunked-transfer-coding"
},
{
"category": "external",
"summary": "https://github.com/JLLeitschuh/unCVEed/issues/1",
"url": "https://github.com/JLLeitschuh/unCVEed/issues/1"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/edb55fd8e0a3bcbd85881e423464f585183d1284",
"url": "https://github.com/netty/netty/commit/edb55fd8e0a3bcbd85881e423464f585183d1284"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/issues/15522",
"url": "https://github.com/netty/netty/issues/15522"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/pull/15611",
"url": "https://github.com/netty/netty/pull/15611"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-fghv-69vj-qj49",
"url": "https://github.com/netty/netty/security/advisories/GHSA-fghv-69vj-qj49"
},
{
"category": "external",
"summary": "https://w4ke.info/2025/06/18/funky-chunks.html",
"url": "https://w4ke.info/2025/06/18/funky-chunks.html"
}
],
"release_date": "2025-09-03T20:56:50.732000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-02T14:54:02+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 8.1.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:17299"
},
{
"category": "workaround",
"details": "To mitigate this issue, enforce strict RFC compliance on all front-end proxies and load balancers so that lone LF characters in chunk extensions are rejected or normalized before being forwarded. Additionally, configure input validation at the application or proxy layer to block malformed chunked requests, ensuring consistent parsing across all components in the request path.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 8.1.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 8.1.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty-codec-http: Netty is vulnerable to request smuggling due to incorrect parsing of chunk extensions"
}
]
}
RHSA-2026:10199
Vulnerability from csaf_redhat - Published: 2026-04-23 16:00 - Updated: 2026-04-29 04:36A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.
A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the "Mark temporarily offline" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user's browser.
A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.
A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.21.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.21 security update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10199",
"url": "https://access.redhat.com/errata/RHSA-2026:10199"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-29371",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27099",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27100",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33001",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.21/html/jenkins",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/4.21/html/jenkins"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10199.json"
}
],
"title": "Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.21 security update.",
"tracking": {
"current_release_date": "2026-04-29T04:36:19+00:00",
"generator": {
"date": "2026-04-29T04:36:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.6"
}
},
"id": "RHSA-2026:10199",
"initial_release_date": "2026-04-23T16:00:39+00:00",
"revision_history": [
{
"date": "2026-04-23T16:00:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-23T16:00:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T04:36:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services 4.21",
"product": {
"name": "OpenShift Developer Tools and Services 4.21",
"product_id": "OpenShift Developer Tools and Services 4.21",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.21::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Developer Tools and Services"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3A960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3A0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3A486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3A1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3Aa41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3Aab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3Acef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944183"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3Ab453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=1776944215"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64 as a component of OpenShift Developer Tools and Services 4.21",
"product_id": "OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.21"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64 as a component of OpenShift Developer Tools and Services 4.21",
"product_id": "OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.21"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le as a component of OpenShift Developer Tools and Services 4.21",
"product_id": "OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.21"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x as a component of OpenShift Developer Tools and Services 4.21",
"product_id": "OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.21"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64 as a component of OpenShift Developer Tools and Services 4.21",
"product_id": "OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.21"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64 as a component of OpenShift Developer Tools and Services 4.21",
"product_id": "OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.21"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le as a component of OpenShift Developer Tools and Services 4.21",
"product_id": "OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.21"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x as a component of OpenShift Developer Tools and Services 4.21",
"product_id": "OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.21"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-29371",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-17T16:01:18.173727+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423194"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important as it can lead to a Denial of Service in applications that process untrusted JSON Web Encryption tokens. An attacker can craft a malicious JWE token with an exceptionally high compression ratio, causing excessive memory allocation and processing time during decompression in affected components like jose4j. This affects products such as Red Hat AMQ, Enterprise Application Platform (EAP 8.0.z, 8.1.z), Red Hat JBoss Fuse, JBoss Data Grid, OpenShift Developer Tools \u0026 Services, Red Hat build of Apache Camel, Red Hat Integration, Red Hat OpenShift Dev Spaces, Red Hat Process Automation Manager, Red Hat Single Sign-On (RH-SSO), Insights, cloud.redhat.com, and OpenShift Serverless.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "RHBZ#2423194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack",
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
}
],
"release_date": "2025-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T16:00:39+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.21 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10199"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression"
},
{
"cve": "CVE-2026-27099",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2026-02-18T15:02:52.012661+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440638"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability, identified as a stored cross-site scripting (XSS) issue, occurs because Jenkins does not properly escape the user-provided description for the \"Mark temporarily offline\" cause. An attacker with Agent/Configure or Agent/Disconnect permissions can exploit this to inject malicious scripts, leading to potential information disclosure or unauthorized actions within the user\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Jenkins allows authenticated attackers with Agent/Configure or Agent/Disconnect permissions to inject malicious scripts into the \"Mark temporarily offline\" cause description. This stored cross-site scripting (XSS) flaw can lead to information disclosure or unauthorized actions within a user\u0027s browser when viewing the affected description. Red Hat OpenShift Developer Tools \u0026 Services are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27099"
},
{
"category": "external",
"summary": "RHBZ#2440638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440638"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27099"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669"
}
],
"release_date": "2026-02-18T14:17:43.911000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T16:00:39+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.21 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10199"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description"
},
{
"cve": "CVE-2026-27100",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-02-18T15:02:47.032150+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2440637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. An attacker with Item/Build and Item/Configure permissions can exploit this vulnerability by submitting Run Parameter values that refer to builds they do not have authorization to access. This allows the attacker to obtain sensitive information, including the existence of jobs, the existence of builds, and the display names of specific builds. This is an information disclosure vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This information disclosure vulnerability in Jenkins allows an attacker with Item/Build and Item/Configure permissions to gain knowledge about the existence and display names of jobs and builds they are not authorized to access. This affects Jenkins instances in OpenShift Developer Tools \u0026 Services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27100"
},
{
"category": "external",
"summary": "RHBZ#2440637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658",
"url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658"
}
],
"release_date": "2026-02-18T14:17:44.672000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T16:00:39+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.21 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10199"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters"
},
{
"cve": "CVE-2026-33001",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-03-18T16:02:14.310096+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448645"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33001"
},
{
"category": "external",
"summary": "RHBZ#2448645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33001"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657",
"url": "https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657"
}
],
"release_date": "2026-03-18T15:15:23.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T16:00:39+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.21 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10199"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:486c0dc417df5beebbdb4ee2a017a4d9407c908fe54f490536f01fc15392ca97_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:960e04991a991ed13884d7d8a7fec07700987d506f3abe5d133cea2c540e88bd_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:a41770290a3a672afc88cfae5beb3400efd65cbb0ce6e31375dc72b27c916190_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:cef039248b506b2025c497267785e0580fc41d5648680df0d6b4e80b9a8b8f96_s390x",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:0a28ecee68681bd1cf50af7dfe9e5c4f54243712b02c3fa9871ee53e42782630_amd64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:1002c6e3e9e893c566bc213b0e0bd9a4a2b9fa4f6e233602392577b51a3df2e4_arm64",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:ab75a59f66bebc8f744ab96322366731040091991b02c2273c3e80193ed2b454_ppc64le",
"OpenShift Developer Tools and Services 4.21:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:b453e75ddba6af9e051981f8c0002827b2344e1266036eefa153664fa45d4da7_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives"
}
]
}
RHSA-2024:5482
Vulnerability from csaf_redhat - Published: 2024-08-15 20:07 - Updated: 2026-04-29 04:36A server-side request forgery (SSRF) vulnerability was found in Apache CXF. This issue occurs in attacks on webservices that take at least one parameter of any type, and when Aegisdatabind is used. Users of other data bindings including the default databinding are not impacted.
A flaw was found in the io.netty:netty-codec-http package. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling issues due to the accumulation of data in the HttpPostRequestDecoder. The decoder cumulates bytes in the undecodedChunk buffer until it can decode a field, allowing data to accumulate without limits. This flaw allows an attacker to cause a denial of service by sending a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData list.
A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.
A vulnerability was found in Bouncy Castle. An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java). Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.
A flaw was found in the Bouncy Castle Java cryptography APIs. Affected versions of the org.bouncycastle:bcprov-jdk18on package are vulnerable to Observable Timing Discrepancy via the PKCS#1 1.5 and OAEP decryption process (a.k.a. Marvin Attack). An attacker can recover cipher-texts via a side-channel attack by exploiting the Marvin security flaw. The PKCS#1 1.5 attack vector leaks data via javax.crypto.Cipher exceptions and the OAEP interface vector leaks via the bit size of the decrypted data.
A flaw was found in the Bouncy Castle Java Cryptography APIs. Affected versions of this package are vulnerable to an Infinite loop issue in ED25519 verification in the ScalarUtil class. This flaw allows an attacker to send a malicious signature and public key to trigger a denial of service.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 8.0. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.0.3 serves as a replacement for Red Hat JBoss Enterprise Application Platform 8.0.2, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 8.0.3 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding [eap-8.0.z] (CVE-2024-28752)\n\n* org.bouncycastle-bcprov-jdk18on: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) [eap-8.0.z] (CVE-2024-30171)\n\n* netty-codec-http: Allocation of Resources Without Limits or Throttling [eap-8.0.z] (CVE-2024-29025)\n\n* org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class [eap-8.0.z] (CVE-2024-30172)\n\n* org.bouncycastle:bcprov-jdk18on: org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service [eap-8.0.z] (CVE-2024-29857)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:5482",
"url": "https://access.redhat.com/errata/RHSA-2024:5482"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/8.0",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/8.0"
},
{
"category": "external",
"summary": "2270732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732"
},
{
"category": "external",
"summary": "2272907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907"
},
{
"category": "external",
"summary": "2276360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276360"
},
{
"category": "external",
"summary": "2293025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293025"
},
{
"category": "external",
"summary": "2293028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293028"
},
{
"category": "external",
"summary": "JBEAP-25224",
"url": "https://issues.redhat.com/browse/JBEAP-25224"
},
{
"category": "external",
"summary": "JBEAP-26018",
"url": "https://issues.redhat.com/browse/JBEAP-26018"
},
{
"category": "external",
"summary": "JBEAP-26696",
"url": "https://issues.redhat.com/browse/JBEAP-26696"
},
{
"category": "external",
"summary": "JBEAP-26790",
"url": "https://issues.redhat.com/browse/JBEAP-26790"
},
{
"category": "external",
"summary": "JBEAP-26791",
"url": "https://issues.redhat.com/browse/JBEAP-26791"
},
{
"category": "external",
"summary": "JBEAP-26802",
"url": "https://issues.redhat.com/browse/JBEAP-26802"
},
{
"category": "external",
"summary": "JBEAP-26816",
"url": "https://issues.redhat.com/browse/JBEAP-26816"
},
{
"category": "external",
"summary": "JBEAP-26823",
"url": "https://issues.redhat.com/browse/JBEAP-26823"
},
{
"category": "external",
"summary": "JBEAP-26843",
"url": "https://issues.redhat.com/browse/JBEAP-26843"
},
{
"category": "external",
"summary": "JBEAP-26886",
"url": "https://issues.redhat.com/browse/JBEAP-26886"
},
{
"category": "external",
"summary": "JBEAP-26932",
"url": "https://issues.redhat.com/browse/JBEAP-26932"
},
{
"category": "external",
"summary": "JBEAP-26948",
"url": "https://issues.redhat.com/browse/JBEAP-26948"
},
{
"category": "external",
"summary": "JBEAP-26961",
"url": "https://issues.redhat.com/browse/JBEAP-26961"
},
{
"category": "external",
"summary": "JBEAP-26962",
"url": "https://issues.redhat.com/browse/JBEAP-26962"
},
{
"category": "external",
"summary": "JBEAP-26966",
"url": "https://issues.redhat.com/browse/JBEAP-26966"
},
{
"category": "external",
"summary": "JBEAP-26986",
"url": "https://issues.redhat.com/browse/JBEAP-26986"
},
{
"category": "external",
"summary": "JBEAP-27002",
"url": "https://issues.redhat.com/browse/JBEAP-27002"
},
{
"category": "external",
"summary": "JBEAP-27019",
"url": "https://issues.redhat.com/browse/JBEAP-27019"
},
{
"category": "external",
"summary": "JBEAP-27055",
"url": "https://issues.redhat.com/browse/JBEAP-27055"
},
{
"category": "external",
"summary": "JBEAP-27090",
"url": "https://issues.redhat.com/browse/JBEAP-27090"
},
{
"category": "external",
"summary": "JBEAP-27192",
"url": "https://issues.redhat.com/browse/JBEAP-27192"
},
{
"category": "external",
"summary": "JBEAP-27194",
"url": "https://issues.redhat.com/browse/JBEAP-27194"
},
{
"category": "external",
"summary": "JBEAP-27261",
"url": "https://issues.redhat.com/browse/JBEAP-27261"
},
{
"category": "external",
"summary": "JBEAP-27262",
"url": "https://issues.redhat.com/browse/JBEAP-27262"
},
{
"category": "external",
"summary": "JBEAP-27327",
"url": "https://issues.redhat.com/browse/JBEAP-27327"
},
{
"category": "external",
"summary": "JBEAP-27356",
"url": "https://issues.redhat.com/browse/JBEAP-27356"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5482.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.3 Security update",
"tracking": {
"current_release_date": "2026-04-29T04:36:15+00:00",
"generator": {
"date": "2026-04-29T04:36:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.6"
}
},
"id": "RHSA-2024:5482",
"initial_release_date": "2024-08-15T20:07:00+00:00",
"revision_history": [
{
"date": "2024-08-15T20:07:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-08-15T20:07:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T04:36:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 8",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 8",
"product_id": "Red Hat JBoss Enterprise Application Platform 8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:8.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-28752",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"discovery_date": "2024-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270732"
}
],
"notes": [
{
"category": "description",
"text": "A server-side request forgery (SSRF) vulnerability was found in Apache CXF. This issue occurs in attacks on webservices that take at least one parameter of any type, and when Aegisdatabind is used. Users of other data bindings including the default databinding are not impacted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates this as an Important impact due to the fact this requires Aegis databind, which is not the default databinding for Apache CXF.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-28752"
},
{
"category": "external",
"summary": "RHBZ#2270732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-28752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752"
},
{
"category": "external",
"summary": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt",
"url": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-qmgx-j96g-4428",
"url": "https://github.com/advisories/GHSA-qmgx-j96g-4428"
}
],
"release_date": "2024-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:07:00+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5482"
},
{
"category": "workaround",
"details": "No mitigation is currently available for this vulnerability. Please make sure to update as the fixes become available.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2272907"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the io.netty:netty-codec-http package. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling issues due to the accumulation of data in the HttpPostRequestDecoder. The decoder cumulates bytes in the undecodedChunk buffer until it can decode a field, allowing data to accumulate without limits. This flaw allows an attacker to cause a denial of service by sending a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData list.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty-codec-http: Allocation of Resources Without Limits or Throttling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability in io.netty:netty-codec-http, allowing for Allocation of Resources Without Limits or Throttling issues, is assessed as moderate severity due to its potential impact on system availability and performance. By exploiting the flaw in HttpPostRequestDecoder, an attacker can craft chunked POST requests with numerous small fields, causing excessive accumulation of data in memory buffers. This unrestricted accumulation can lead to significant memory consumption on the server, potentially exhausting available resources and resulting in denial of service (DoS) conditions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29025"
},
{
"category": "external",
"summary": "RHBZ#2272907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025"
},
{
"category": "external",
"summary": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3",
"url": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c",
"url": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v",
"url": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812",
"url": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812"
}
],
"release_date": "2024-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:07:00+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5482"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty-codec-http: Allocation of Resources Without Limits or Throttling"
},
{
"cve": "CVE-2024-29371",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-17T16:01:18.173727+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423194"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important as it can lead to a Denial of Service in applications that process untrusted JSON Web Encryption tokens. An attacker can craft a malicious JWE token with an exceptionally high compression ratio, causing excessive memory allocation and processing time during decompression in affected components like jose4j. This affects products such as Red Hat AMQ, Enterprise Application Platform (EAP 8.0.z, 8.1.z), Red Hat JBoss Fuse, JBoss Data Grid, OpenShift Developer Tools \u0026 Services, Red Hat build of Apache Camel, Red Hat Integration, Red Hat OpenShift Dev Spaces, Red Hat Process Automation Manager, Red Hat Single Sign-On (RH-SSO), Insights, cloud.redhat.com, and OpenShift Serverless.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "RHBZ#2423194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371"
},
{
"category": "external",
"summary": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack",
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
}
],
"release_date": "2025-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:07:00+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5482"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression"
},
{
"cve": "CVE-2024-29857",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293028"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Bouncy Castle. An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java). Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29857"
},
{
"category": "external",
"summary": "RHBZ#2293028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29857",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29857"
}
],
"release_date": "2024-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:07:00+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5482"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service"
},
{
"acknowledgments": [
{
"names": [
"Hubert Kario"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2024-30171",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"discovery_date": "2024-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2276360"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Bouncy Castle Java cryptography APIs. Affected versions of the org.bouncycastle:bcprov-jdk18on package are vulnerable to Observable Timing Discrepancy via the PKCS#1 1.5 and OAEP decryption process (a.k.a. Marvin Attack). An attacker can recover cipher-texts via a side-channel attack by exploiting the Marvin security flaw. The PKCS#1 1.5 attack vector leaks data via javax.crypto.Cipher exceptions and the OAEP interface vector leaks via the bit size of the decrypted data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-30171"
},
{
"category": "external",
"summary": "RHBZ#2276360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276360"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-30171",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-30171"
},
{
"category": "external",
"summary": "https://people.redhat.com/~hkario/marvin/",
"url": "https://people.redhat.com/~hkario/marvin/"
}
],
"release_date": "2024-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:07:00+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5482"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack)"
},
{
"cve": "CVE-2024-30172",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293025"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Bouncy Castle Java Cryptography APIs. Affected versions of this package are vulnerable to an Infinite loop issue in ED25519 verification in the ScalarUtil class. This flaw allows an attacker to send a malicious signature and public key to trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-30172"
},
{
"category": "external",
"summary": "RHBZ#2293025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293025"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-30172",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-30172"
},
{
"category": "external",
"summary": "https://www.bouncycastle.org/latest_releases.html",
"url": "https://www.bouncycastle.org/latest_releases.html"
}
],
"release_date": "2024-05-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-15T20:07:00+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5482"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class"
}
]
}
CERTFR-2026-AVI-0327
Vulnerability from certfr_avis - Published: 2026-03-20 - Updated: 2026-03-20
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling B2B Integrator | Sterling B2B Integrator et Sterling File Gateway versions 6.1.x antérieures à 6.1.2.8 | ||
| IBM | Sterling | Sterling Control Center versions 6.4.2.x antérieures à 6.4.2.0 iFix01 | ||
| IBM | Sterling B2B Integrator | Sterling B2B Integrator et Sterling File Gateway versions 6.2.2.x antérieures à 6.2.2.0_1 | ||
| IBM | Informix Dynamic Server | Informix Dynamic Server versions 12.10.x antérieures à 12.10.xC16W6 | ||
| IBM | WebSphere | WebSphere Hybrid Edition version 5.1 sans les correctifs de sécurité PH69757 et PH69729 | ||
| IBM | Sterling B2B Integrator | Sterling B2B Integrator et Sterling File Gateway versions 6.2.x antérieures à 6.2.0.5_2 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP15 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions 1.10.12.x antérieures à 1.11.9.0 | ||
| IBM | Sterling | Sterling Control Center versions 6.3.1.x antérieures à 6.3.1.0 iFix07 | ||
| IBM | Cloud Pak | Cloud Pak for Security versions 1.10.x antérieures à 1.11.9.0 | ||
| IBM | Sterling | Sterling Control Center versions 6.4.1.x antérieures à 6.4.1.0 iFix01 | ||
| IBM | Sterling B2B Integrator | Sterling B2B Integrator et Sterling File Gateway versions 6.2.1.x antérieures à 6.2.1.1_2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sterling B2B Integrator et Sterling File Gateway versions 6.1.x ant\u00e9rieures \u00e0 6.1.2.8",
"product": {
"name": "Sterling B2B Integrator",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.4.2.x ant\u00e9rieures \u00e0 6.4.2.0 iFix01",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling B2B Integrator et Sterling File Gateway versions 6.2.2.x ant\u00e9rieures \u00e0 6.2.2.0_1",
"product": {
"name": "Sterling B2B Integrator",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Informix Dynamic Server versions 12.10.x ant\u00e9rieures \u00e0 12.10.xC16W6",
"product": {
"name": "Informix Dynamic Server",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Hybrid Edition version 5.1 sans les correctifs de s\u00e9curit\u00e9 PH69757 et PH69729",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling B2B Integrator et Sterling File Gateway versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.5_2",
"product": {
"name": "Sterling B2B Integrator",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP15",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions 1.10.12.x ant\u00e9rieures \u00e0 1.11.9.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.3.1.x ant\u00e9rieures \u00e0 6.3.1.0 iFix07",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Security versions 1.10.x ant\u00e9rieures \u00e0 1.11.9.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.4.1.x ant\u00e9rieures \u00e0 6.4.1.0 iFix01",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling B2B Integrator et Sterling File Gateway versions 6.2.1.x ant\u00e9rieures \u00e0 6.2.1.1_2",
"product": {
"name": "Sterling B2B Integrator",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-32996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32996"
},
{
"name": "CVE-2025-62727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62727"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2025-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9287"
},
{
"name": "CVE-2025-14242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14242"
},
{
"name": "CVE-2024-47831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47831"
},
{
"name": "CVE-2025-32421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32421"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"name": "CVE-2024-51479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51479"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2025-39933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39933"
},
{
"name": "CVE-2025-22150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22150"
},
{
"name": "CVE-2022-46337",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46337"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2024-11831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11831"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2022-50673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50673"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-6545",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6545"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-55173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55173"
},
{
"name": "CVE-2025-4897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4897"
},
{
"name": "CVE-2025-48068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48068"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2025-57752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57752"
},
{
"name": "CVE-2025-32997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32997"
},
{
"name": "CVE-2026-1188",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1188"
},
{
"name": "CVE-2023-53552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53552"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2025-57350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57350"
},
{
"name": "CVE-2025-66453",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66453"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-58457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58457"
},
{
"name": "CVE-2025-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48913"
},
{
"name": "CVE-2025-59250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59250"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2024-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
},
{
"name": "CVE-2025-64775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64775"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2020-7660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7660"
},
{
"name": "CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-14031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14031"
},
{
"name": "CVE-2025-23184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23184"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2022-50865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50865"
},
{
"name": "CVE-2025-29927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29927"
},
{
"name": "CVE-2025-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27533"
},
{
"name": "CVE-2023-44483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44483"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2026-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1264"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-66675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66675"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-6547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6547"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-57352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57352"
},
{
"name": "CVE-2024-26766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26766"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
}
],
"initial_release_date": "2026-03-20T00:00:00",
"last_revision_date": "2026-03-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0327",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7266518",
"url": "https://www.ibm.com/support/pages/node/7266518"
},
{
"published_at": "2026-03-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7263574",
"url": "https://www.ibm.com/support/pages/node/7263574"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7266520",
"url": "https://www.ibm.com/support/pages/node/7266520"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7266678",
"url": "https://www.ibm.com/support/pages/node/7266678"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7266497",
"url": "https://www.ibm.com/support/pages/node/7266497"
},
{
"published_at": "2026-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7266324",
"url": "https://www.ibm.com/support/pages/node/7266324"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7266711",
"url": "https://www.ibm.com/support/pages/node/7266711"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7266677",
"url": "https://www.ibm.com/support/pages/node/7266677"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7266399",
"url": "https://www.ibm.com/support/pages/node/7266399"
},
{
"published_at": "2026-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7266321",
"url": "https://www.ibm.com/support/pages/node/7266321"
}
]
}
CERTFR-2026-AVI-0372
Vulnerability from certfr_avis - Published: 2026-03-27 - Updated: 2026-03-27
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
L'éditeur indique que les versions correctives suivantes seront mises à disposition ultérieurement : - WebSphere Application Server - Liberty 26.0.0.4 (deuxième trimestre 2026)
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | WebSphere | WebSphere Remote Server versions 9.1, 9.0 et 8.5 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | WebSphere Application Server - Liberty sans le correctif APAR PH70510 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct pour UNIX versions 6.4.x antérieures à 6.4.0.5 | ||
| IBM | WebSphere | WebSphere eXtreme Scale versions 8.6.1.x antérieures à 8.6.1.6 sans le correctif APAR PH70422 | ||
| IBM | Security QRadar Log Management AQL | greffon Security QRadar Log Management AQL versions 1.x antérieures à 1.1.4 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct pour UNIX versions 6.3.x antérieures à 6.3.0.7 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct FTP+ versions 1.3.0.x antérieures à 1.3.0.4 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "WebSphere Remote Server versions 9.1, 9.0 et 8.5 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server - Liberty sans le correctif APAR PH70510",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct pour UNIX versions 6.4.x ant\u00e9rieures \u00e0 6.4.0.5",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere eXtreme Scale versions 8.6.1.x ant\u00e9rieures \u00e0 8.6.1.6 sans le correctif APAR PH70422",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "greffon Security QRadar Log Management AQL versions 1.x ant\u00e9rieures \u00e0 1.1.4",
"product": {
"name": "Security QRadar Log Management AQL",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct pour UNIX versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.7",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct FTP+ versions 1.3.0.x ant\u00e9rieures \u00e0 1.3.0.4",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "L\u0027\u00e9diteur indique que les versions correctives suivantes seront mises \u00e0 disposition ult\u00e9rieurement : \n- WebSphere Application Server - Liberty 26.0.0.4 (deuxi\u00e8me trimestre 2026)",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2026-1188",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1188"
},
{
"name": "CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2026-29063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29063"
}
],
"initial_release_date": "2026-03-27T00:00:00",
"last_revision_date": "2026-03-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0372",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7267514",
"url": "https://www.ibm.com/support/pages/node/7267514"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7267346",
"url": "https://www.ibm.com/support/pages/node/7267346"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7267392",
"url": "https://www.ibm.com/support/pages/node/7267392"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7267689",
"url": "https://www.ibm.com/support/pages/node/7267689"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7267351",
"url": "https://www.ibm.com/support/pages/node/7267351"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7267058",
"url": "https://www.ibm.com/support/pages/node/7267058"
}
]
}
CERTFR-2026-AVI-0479
Vulnerability from certfr_avis - Published: 2026-04-22 - Updated: 2026-04-22
De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Atlassian | Confluence | Confluence Data Center versions 10.x antérieures à 10.2.10 | ||
| Atlassian | Jira | Jira Service Management Data Center versions 11.x antérieures à 11.3.4 | ||
| Atlassian | Jira | Jira Software Server versions antérieures à 9.12.33 | ||
| Atlassian | Confluence | Confluence Data Center versions antérieures à 9.2.19 | ||
| Atlassian | Jira | Jira Software Data Center versions 10.x antérieures à 10.3.19 | ||
| Atlassian | Jira | Jira Software Data Center versions antérieures à 9.12.34 | ||
| Atlassian | Jira | Jira Service Management Data Center versions antérieures à 10.3.19 | ||
| Atlassian | Jira | Jira Service Management Server versions antérieures à 10.3.13 | ||
| Atlassian | Jira | Jira Software Server versions 10.x antérieures à 10.3.16 | ||
| Atlassian | Jira | Jira Software Data Center versions 11.x antérieures à 11.3.4 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Confluence Data Center versions 10.x ant\u00e9rieures \u00e0 10.2.10",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Data Center versions 11.x ant\u00e9rieures \u00e0 11.3.4",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.12.33",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.2.19",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Data Center versions 10.x ant\u00e9rieures \u00e0 10.3.19",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.12.34",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.3.19",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 10.3.13",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Server versions 10.x ant\u00e9rieures \u00e0 10.3.16",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Data Center versions 11.x ant\u00e9rieures \u00e0 11.3.4",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-33871",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33871"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2021-0341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0341"
},
{
"name": "CVE-2023-48631",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48631"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2026-33870",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33870"
},
{
"name": "CVE-2026-22029",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22029"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2024-45801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
},
{
"name": "CVE-2021-31597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31597"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"name": "CVE-2024-47875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
},
{
"name": "CVE-2026-25639",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25639"
},
{
"name": "CVE-2025-66020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66020"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2026-29063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29063"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"initial_release_date": "2026-04-22T00:00:00",
"last_revision_date": "2026-04-22T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0479",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
"vendor_advisories": [
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26754",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26754"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16542",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16542"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26657",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26657"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16551",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16551"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26764",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26764"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-103476",
"url": "https://jira.atlassian.com/browse/CONFSERVER-103476"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-103467",
"url": "https://jira.atlassian.com/browse/CONFSERVER-103467"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-103471",
"url": "https://jira.atlassian.com/browse/CONFSERVER-103471"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-103469",
"url": "https://jira.atlassian.com/browse/CONFSERVER-103469"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-103475",
"url": "https://jira.atlassian.com/browse/CONFSERVER-103475"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16544",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16544"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-103470",
"url": "https://jira.atlassian.com/browse/CONFSERVER-103470"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-103472",
"url": "https://jira.atlassian.com/browse/CONFSERVER-103472"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-103612",
"url": "https://jira.atlassian.com/browse/CONFSERVER-103612"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-103539",
"url": "https://jira.atlassian.com/browse/CONFSERVER-103539"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-103474",
"url": "https://jira.atlassian.com/browse/CONFSERVER-103474"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26666",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26666"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16557",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16557"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-103517",
"url": "https://jira.atlassian.com/browse/CONFSERVER-103517"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16550",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16550"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16540",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16540"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26765",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26765"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26763",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26763"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26760",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26760"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16552",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16552"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16556",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16556"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-102567",
"url": "https://jira.atlassian.com/browse/CONFSERVER-102567"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-103473",
"url": "https://jira.atlassian.com/browse/CONFSERVER-103473"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-103516",
"url": "https://jira.atlassian.com/browse/CONFSERVER-103516"
},
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-103518",
"url": "https://jira.atlassian.com/browse/CONFSERVER-103518"
}
]
}
CERTFR-2026-AVI-0224
Vulnerability from certfr_avis - Published: 2026-02-27 - Updated: 2026-02-27
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
IBM indique les versions correctives 9.0.5.27 et 26.0.0.3 pour WebSphere Application Server seront disponibles au cours du premier trimestre 2026. La version 8.5.5.30 sera disponible au troisième trimestre 2026.
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | WebSphere | WebSphere Application Server versions 8.x antérieures à 8.5.5.30 | ||
| IBM | WebSphere | WebSphere Application Server - Liberty versions antérieures à 26.0.0.3 | ||
| IBM | QRadar Assistant | QRadar AI Assistant versions antérieures à 1.3.1 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.x antérieures à 6.1.0.3 GA | ||
| IBM | QRadar | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP14 IF05 | ||
| IBM | Sterling | Sterling Transformation Extender sans l'application des mesures de contournement décrites par l'éditeur | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.2.1.x antérieures à 6.2.1.1 GA | ||
| IBM | Db2 | Db2 mirror pour i sans les derniers correctifs de sécurité | ||
| IBM | WebSphere | WebSphere Application Server versions 9.x antérieures à 9.0.5.27 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.2.x antérieures à 6.2.0.3 GA | ||
| IBM | Cognos Command Center | Cognos Command Center versions antérieures à 10.2.5 FP1 IF3 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "WebSphere Application Server versions 8.x ant\u00e9rieures \u00e0 8.5.5.30",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server - Liberty versions ant\u00e9rieures \u00e0 26.0.0.3",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar AI Assistant versions ant\u00e9rieures \u00e0 1.3.1",
"product": {
"name": "QRadar Assistant",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.3 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP14 IF05",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Transformation Extender sans l\u0027application des mesures de contournement d\u00e9crites par l\u0027\u00e9diteur",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.2.1.x ant\u00e9rieures \u00e0 6.2.1.1 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 mirror pour i sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 9.x ant\u00e9rieures \u00e0 9.0.5.27",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.3 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Command Center versions ant\u00e9rieures \u00e0 10.2.5 FP1 IF3",
"product": {
"name": "Cognos Command Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "IBM indique les versions correctives 9.0.5.27 et 26.0.0.3 pour WebSphere Application Server seront disponibles au cours du premier trimestre 2026. La version 8.5.5.30 sera disponible au troisi\u00e8me trimestre 2026.",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-65106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65106"
},
{
"name": "CVE-2026-22610",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22610"
},
{
"name": "CVE-2025-66412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66412"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-69223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69223"
},
{
"name": "CVE-2025-66035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66035"
},
{
"name": "CVE-2025-68664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68664"
},
{
"name": "CVE-2026-22701",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22701"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2026-22690",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22690"
},
{
"name": "CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"name": "CVE-2025-69230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69230"
},
{
"name": "CVE-2025-66019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66019"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-66031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66031"
},
{
"name": "CVE-2025-69225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69225"
},
{
"name": "CVE-2026-21860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21860"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2023-53673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53673"
},
{
"name": "CVE-2026-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1615"
},
{
"name": "CVE-2025-69227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69227"
},
{
"name": "CVE-2026-1188",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1188"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2025-68146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68146"
},
{
"name": "CVE-2025-66030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66030"
},
{
"name": "CVE-2025-61140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61140"
},
{
"name": "CVE-2025-66221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66221"
},
{
"name": "CVE-2025-69228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69228"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-69226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69226"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-69224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69224"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-69229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69229"
},
{
"name": "CVE-2025-68480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68480"
},
{
"name": "CVE-2025-14847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14847"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2025-68615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68615"
},
{
"name": "CVE-2026-22691",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22691"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
}
],
"initial_release_date": "2026-02-27T00:00:00",
"last_revision_date": "2026-02-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0224",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7261959",
"url": "https://www.ibm.com/support/pages/node/7261959"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7261794",
"url": "https://www.ibm.com/support/pages/node/7261794"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7261890",
"url": "https://www.ibm.com/support/pages/node/7261890"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7261887",
"url": "https://www.ibm.com/support/pages/node/7261887"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7261935",
"url": "https://www.ibm.com/support/pages/node/7261935"
},
{
"published_at": "2026-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7261436",
"url": "https://www.ibm.com/support/pages/node/7261436"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7261774",
"url": "https://www.ibm.com/support/pages/node/7261774"
}
]
}
CERTFR-2026-AVI-0281
Vulnerability from certfr_avis - Published: 2026-03-12 - Updated: 2026-03-12
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk AppDynamics Private Synthetic Agent | Splunk AppDynamics Private Synthetic Agent versions 26.1.x antérieures à 26.1.0 | ||
| Splunk | Splunk AppDynamics On-Premises Enterprise Console | Splunk AppDynamics On-Premises Enterprise Console versions 26.1.x antérieures à 26.1.1 | ||
| Splunk | Splunk AppDynamics Database Agent | Splunk AppDynamics Database Agent versions 26.1.x antérieures à 26.1.0 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 10.0.2503 antérieures à 10.0.2503.12 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.124 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.9 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.2.x antérieures à 10.2.1 | ||
| Splunk | Splunk AppDynamics NodeJS Agent | Splunk AppDynamics NodeJS Agent versions 25.12.x antérieures à 25.12.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.0.x antérieures à 10.0.4 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.10 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 10.1.2507 antérieures à 10.1.2507.17 | ||
| Splunk | Splunk AppDynamics Java Agent | Splunk AppDynamics Java Agent versions 26.1.x antérieures à 26.1.0 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 10.2.2510 antérieures à 10.2.2510.7 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk AppDynamics Private Synthetic Agent versions 26.1.x ant\u00e9rieures \u00e0 26.1.0",
"product": {
"name": "Splunk AppDynamics Private Synthetic Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics On-Premises Enterprise Console versions 26.1.x ant\u00e9rieures \u00e0 26.1.1",
"product": {
"name": "Splunk AppDynamics On-Premises Enterprise Console",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics Database Agent versions 26.1.x ant\u00e9rieures \u00e0 26.1.0",
"product": {
"name": "Splunk AppDynamics Database Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.0.2503 ant\u00e9rieures \u00e0 10.0.2503.12",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.124",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.9",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.2.x ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics NodeJS Agent versions 25.12.x ant\u00e9rieures \u00e0 25.12.1",
"product": {
"name": "Splunk AppDynamics NodeJS Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.4",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.10",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.1.2507 ant\u00e9rieures \u00e0 10.1.2507.17",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics Java Agent versions 26.1.x ant\u00e9rieures \u00e0 26.1.0",
"product": {
"name": "Splunk AppDynamics Java Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.2.2510 ant\u00e9rieures \u00e0 10.2.2510.7",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2018-16864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16864"
},
{
"name": "CVE-2025-48073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48073"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-11219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11219"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1594"
},
{
"name": "CVE-2025-3887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3887"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-4574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4574"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12433"
},
{
"name": "CVE-2025-12444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12444"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2025-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11213"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-12036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12036"
},
{
"name": "CVE-2012-0871",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0871"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2025-0518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0518"
},
{
"name": "CVE-2025-69223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69223"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-12438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12438"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-26464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26464"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2025-12435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12435"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2013-4394",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4394"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2025-64183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64183"
},
{
"name": "CVE-2025-13226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13226"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-47808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47808"
},
{
"name": "CVE-2021-46877",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46877"
},
{
"name": "CVE-2026-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2391"
},
{
"name": "CVE-2017-18078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18078"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2019-17571",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17571"
},
{
"name": "CVE-2025-11207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11207"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2025-13223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13223"
},
{
"name": "CVE-2025-12431",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12431"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2024-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7246"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2026-21226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21226"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-33202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
},
{
"name": "CVE-2025-12726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12726"
},
{
"name": "CVE-2025-12445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12445"
},
{
"name": "CVE-2025-12437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12437"
},
{
"name": "CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"name": "CVE-2025-69230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69230"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-0716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0716"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-12434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12434"
},
{
"name": "CVE-2025-69225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69225"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-12439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12439"
},
{
"name": "CVE-2018-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16865"
},
{
"name": "CVE-2025-14874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14874"
},
{
"name": "CVE-2020-17521",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17521"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2025-48072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48072"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-12432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12432"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2026-20165",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20165"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-22919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22919"
},
{
"name": "CVE-2024-23672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23672"
},
{
"name": "CVE-2025-69227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69227"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-12443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12443"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-6602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6602"
},
{
"name": "CVE-2025-11215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11215"
},
{
"name": "CVE-2013-4393",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4393"
},
{
"name": "CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"name": "CVE-2025-11205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11205"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-12725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12725"
},
{
"name": "CVE-2022-23305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23305"
},
{
"name": "CVE-2025-11208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11208"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2024-8372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8372"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11756"
},
{
"name": "CVE-2025-59730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59730"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2025-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13033"
},
{
"name": "CVE-2022-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23307"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11212"
},
{
"name": "CVE-2025-12495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12495"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2025-12840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12840"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-11458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11458"
},
{
"name": "CVE-2020-1712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1712"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12429"
},
{
"name": "CVE-2026-20164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20164"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2025-11211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11211"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2023-26118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26118"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-69228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69228"
},
{
"name": "CVE-2025-59250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59250"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2025-47807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47807"
},
{
"name": "CVE-2025-47806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47806"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-64182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64182"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2023-6604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6604"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2017-9217",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9217"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2025-64181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64181"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-12436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12436"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2025-13230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13230"
},
{
"name": "CVE-2013-4327",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4327"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-12446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12446"
},
{
"name": "CVE-2025-13228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13228"
},
{
"name": "CVE-2013-4391",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4391"
},
{
"name": "CVE-2026-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20166"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-12441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12441"
},
{
"name": "CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"name": "CVE-2025-47183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47183"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2023-6601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6601"
},
{
"name": "CVE-2018-16888",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16888"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-69226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69226"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13224"
},
{
"name": "CVE-2025-13042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13042"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2025-11460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11460"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"name": "CVE-2025-13229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13229"
},
{
"name": "CVE-2024-24549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24549"
},
{
"name": "CVE-2025-12440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12440"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-11216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11216"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2018-1049",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1049"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-11210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11210"
},
{
"name": "CVE-2020-36518",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2022-31159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31159"
},
{
"name": "CVE-2025-12729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12729"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-13227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13227"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2025-10256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10256"
},
{
"name": "CVE-2026-20162",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20162"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-12839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12839"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-37727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37727"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2019-3844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3844"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-12728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12728"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2023-6605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6605"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2022-23302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23302"
},
{
"name": "CVE-2025-12430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12430"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2025-11206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11206"
},
{
"name": "CVE-2025-62408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62408"
},
{
"name": "CVE-2018-15686",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15686"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9951"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-59729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59729"
},
{
"name": "CVE-2025-48071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48071"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2025-69224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69224"
},
{
"name": "CVE-2025-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2759"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2025-30153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30153"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2025-69229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69229"
},
{
"name": "CVE-2024-8373",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8373"
},
{
"name": "CVE-2025-11209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11209"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2024-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21490"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2023-49501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49501"
},
{
"name": "CVE-2019-3843",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3843"
},
{
"name": "CVE-2018-6954",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6954"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2026-26981",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26981"
},
{
"name": "CVE-2025-12447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12447"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2013-4392",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4392"
},
{
"name": "CVE-2025-48074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48074"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2016-7795",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7795"
},
{
"name": "CVE-2025-12727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12727"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-12428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12428"
},
{
"name": "CVE-2026-20163",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20163"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2026-03-12T00:00:00",
"last_revision_date": "2026-03-12T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0281",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0302",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0302"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0311",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0311"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0308",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0308"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0309",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0309"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0305",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0305"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0310",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0310"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0304",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0304"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0301",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0301"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0313",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0313"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0306",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0306"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0303",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0303"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0307",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0307"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0312",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0312"
}
]
}
GHSA-3677-XXCR-WJQV
Vulnerability from github – Published: 2025-12-17 18:31 – Updated: 2026-01-06 19:46In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.bitbucket.b_c:jose4j"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.9.6"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-29371"
],
"database_specific": {
"cwe_ids": [
"CWE-1259"
],
"github_reviewed": true,
"github_reviewed_at": "2025-12-18T15:34:32Z",
"nvd_published_at": "2025-12-17T16:16:04Z",
"severity": "HIGH"
},
"details": "In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.",
"id": "GHSA-3677-xxcr-wjqv",
"modified": "2026-01-06T19:46:21Z",
"published": "2025-12-17T18:31:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371"
},
{
"type": "WEB",
"url": "https://bitbucket.org/b_c/jose4j/commits/19a90a64c47bb07c4aa5462f1316d5c293d81fcf"
},
{
"type": "WEB",
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
},
{
"type": "PACKAGE",
"url": "https://bitbucket.org/b_c/jose4j/wiki/Home"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "jose4j is vulnerable to DoS via compressed JWE content"
}
GSD-2024-29371
Vulnerability from gsd - Updated: 2024-04-02 05:02{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-29371"
],
"id": "GSD-2024-29371",
"modified": "2024-04-02T05:02:57.466792Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2024-29371",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}
}
}
cleanstart-2026-ia43044
Vulnerability from cleanstart
Multiple security vulnerabilities affect the strimzi-kafka-operator package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "strimzi-kafka-operator"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.47.0-r3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the strimzi-kafka-operator package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-IA43044",
"modified": "2026-03-23T07:56:09Z",
"published": "2026-04-01T09:30:15.088429Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-IA43044.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-8908"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-42889"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-2976"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-25710"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-26308"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-29371"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-29857"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-30171"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31573"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-47554"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-11143"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-12383"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-48734"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-48924"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58057"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-67735"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68161"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-8916"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1002"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1605"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-72hv-8253-57qq"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8908"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42889"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2976"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25710"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26308"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29371"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29857"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-30171"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31573"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47554"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11143"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12383"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48734"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48924"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58057"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-67735"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68161"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8916"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1002"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1605"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2020-8908, CVE-2022-42889, CVE-2023-2976, CVE-2024-25710, CVE-2024-26308, CVE-2024-29371, CVE-2024-29857, CVE-2024-30171, CVE-2024-31573, CVE-2024-47554, CVE-2025-11143, CVE-2025-12383, CVE-2025-48734, CVE-2025-48924, CVE-2025-58057, CVE-2025-67735, CVE-2025-68161, CVE-2025-8916, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.47.0-r2, 0.47.0-r3",
"upstream": [
"CVE-2020-8908",
"CVE-2022-42889",
"CVE-2023-2976",
"CVE-2024-25710",
"CVE-2024-26308",
"CVE-2024-29371",
"CVE-2024-29857",
"CVE-2024-30171",
"CVE-2024-31573",
"CVE-2024-47554",
"CVE-2025-11143",
"CVE-2025-12383",
"CVE-2025-48734",
"CVE-2025-48924",
"CVE-2025-58057",
"CVE-2025-67735",
"CVE-2025-68161",
"CVE-2025-8916",
"CVE-2026-1002",
"CVE-2026-1605",
"ghsa-72hv-8253-57qq"
]
}
SUSE-SU-2026:1010-1
Vulnerability from csaf_suse - Published: 2026-03-25 10:10 - Updated: 2026-03-25 10:10| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update 5.0.7 for Multi-Linux Manager Server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\nbranch-network-formula:\n\n- Update to version 1.1.0 \n * Enable containers on SLE15SP7\n * Exclude podman interfaces from sysctl setting\n\ncobbler:\n\n- Compatibility fixes for tftpboot directory setup\n\ninter-server-sync:\n\n- Version 0.3.10-0\n * Write log to a rotated file without rsyslog and logrotate\n * Recreate cobbler entries on the import (bsc#1220899)\n * remove support for 4.2 file based pillars\n * use correct hostname detection for 5.x servers\n (bsc#1253322)\n\njose4j:\n\n- CVE-2024-29371: Safeguard against excessive resource utilization by\n restricting the size of data during JWE payload decompression (bsc#1255298)\n\nliberate-formula:\n\n- Version 0.1.2\n * Add option to prevent logo packages from being installed \n\nspacecmd:\n\n- Version 5.0.15-0\n * Fix typo in spacecmd help ca-cert flag (bsc#1253174)\n * Convert cached IDs to int (bsc#1251995)\n * Fix spacecmd binary file upload (bsc#1253659)\n\nspacewalk-backend:\n\n- Version 5.0.17-0\n * Fix reposync mediaproduct fetch when\n URL contains auth token (bsc#1252388)\n\nspacewalk-certs-tools:\n\n- Version 5.0.13-0\n * Fix bootstrap script for SLM 6.2 (bsc#1257992)\n * Fix failing bootstrap with bootstrap script on SLES 16\n and SL Micro 6.2 (bsc#1256991)\n\nspacewalk-client-tools:\n\n- Version 5.0.12-0\n * Update translation strings\n\nspacewalk-config:\n\n- Version 5.0.9-0\n * Enable HSTS in Apache config (bsc#1255176)\n * Force SameSite=Lax on all Set-Cookie headers (bsc#1253711)\n\nspacewalk-java:\n\n- Version 5.0.31-0\n * Commit DB changes before refreshing pillar for SSH push minions\n (bsc#1253712)\n * Fix http proxy verification (bsc#1253501)\n * Fix: Broken URL in API docs (bsc#1244177)\n * Fix crash in ubuntu errata sync on deleted channel ids\n (bsc#1250561)\n * Fix dnf updateinfo showing wrong severity for\n security updates (bsc#1252937)\n * Add details on config channels and state order in UI\n (bsc#1253285)\n * fix reposync crashing at metadata generation (bsc#1257538)\n * Block multiple versions of the same package\n from being locked (bsc#1246315)\n * Use PackageEvr instead of string for fix_version (bsc#1252638)\n * Add multi-thread support for message queue (bsc#1247722)\n * Fix ungrouped systems list menu item (bsc#1254251)\n\nspacewalk-proxy:\n\n- Version 5.0.8-0\n * Disable listing the content of /icons (bsc#1247544)\n\nspacewalk-proxy-installer:\n\n- Version 5.0.3-0\n * Configure squid replacement policy properly before cache dir\n (bsc#1253773)\n\nspacewalk-web:\n\n- Version 5.0.26-0\n * Update web UI dependencies\n * Add details on config channels and state order in UI\n (bsc#1253285)\n\nsusemanager:\n\n- Version 5.0.17-0\n * Fix the product ids of client tools channels\n * Fixed the package name to correct one (bsc#1255089)\n\nsusemanager-build-keys:\n\n- Add openSUSE Backports for SUSE Linux 16 key (bsc#1257255)\n\nsusemanager-docs_en:\n\n- Updated the screenshots in multiple sections in Installation and Upgrade Guide\n- Reformatted storage-scripts table to use plain paragraphs instead of bullet\n lists to fix po4a extraction issue causing missing bullets in CJK translations\n- Added a warning for all instances where mgradm upgrade podman is used\n- Added section about container-based Kiwi image build support to Administration\n guide (bsc#1251865)\n- Included global GPG decryption for pillar data in specialized guide\n (bsc#1255743)\n- CIS removed from list of supported OpenSCAP profiles\n- Changes example for the third-party repository GPG keys (bsc#1255857)\n- Added SLE16 and openSUSE Leap 16 as supported clients\n- Explained how to generate the proxy certificates on a peripheral server\n (bsc#1249425)\n- Improved procedure formatting for better clarity in Administration Guide\n (bsc#1253660)\n- Added links to man pages for createrepo_c and reprepro to Administration\n Guide (bsc#1237181)\n- Added missing options to command example in Installation and Upgrade Guide\n (bsc#1252908)\n- Added non-SUSE URLs to requirements in installation and Upgrade Guide\n (bsc#1252665)\n- Fixed typo for command options in Reference Guide (bsc#1253174)\n- Added additional step for client deletion in Client Configuration Guide\n (bsc#1253249)\n- Clarified server config option for spacemd in Refrence Guide (bsc#1253197)\n- Changed the installation instructions to use product instead of packages\n (bsc#1249041) \n\nsusemanager-schema:\n\n- Version 5.0.18-0\n * Refactor oval related tables (bsc#1252638)\n * Increase size of column \u0027context\u0027 on tables\n \u0027suseappstream\u0027 and \u0027suseserverappstream\u0027 (bsc#1255653)\n * Add leftovers of partially missing ARMHF for Debian (bsc#1248783)\n\nsusemanager-sls:\n\n- Version 5.0.21-0\n * Fix error on shutdown for sles 12 (bsc#1255634)\n * Fix bootstrap for SLM 6.2 and newer (bsc#1257992)\n * Make mgr_events salt engine non-blocking on reading events\n * Avoid losing the events on DB connection issues (bsc#1252098)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1010,SUSE-SUSE-Manager-Proxy-5.0-2026-1010,SUSE-SUSE-Manager-Retail-Branch-Server-5.0-2026-1010,SUSE-SUSE-Manager-Server-5.0-2026-1010",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1010-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1010-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261010-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1010-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024920.html"
},
{
"category": "self",
"summary": "SUSE Bug 1220899",
"url": "https://bugzilla.suse.com/1220899"
},
{
"category": "self",
"summary": "SUSE Bug 1237181",
"url": "https://bugzilla.suse.com/1237181"
},
{
"category": "self",
"summary": "SUSE Bug 1244177",
"url": "https://bugzilla.suse.com/1244177"
},
{
"category": "self",
"summary": "SUSE Bug 1246315",
"url": "https://bugzilla.suse.com/1246315"
},
{
"category": "self",
"summary": "SUSE Bug 1247544",
"url": "https://bugzilla.suse.com/1247544"
},
{
"category": "self",
"summary": "SUSE Bug 1247722",
"url": "https://bugzilla.suse.com/1247722"
},
{
"category": "self",
"summary": "SUSE Bug 1248783",
"url": "https://bugzilla.suse.com/1248783"
},
{
"category": "self",
"summary": "SUSE Bug 1249041",
"url": "https://bugzilla.suse.com/1249041"
},
{
"category": "self",
"summary": "SUSE Bug 1249425",
"url": "https://bugzilla.suse.com/1249425"
},
{
"category": "self",
"summary": "SUSE Bug 1250561",
"url": "https://bugzilla.suse.com/1250561"
},
{
"category": "self",
"summary": "SUSE Bug 1251865",
"url": "https://bugzilla.suse.com/1251865"
},
{
"category": "self",
"summary": "SUSE Bug 1251995",
"url": "https://bugzilla.suse.com/1251995"
},
{
"category": "self",
"summary": "SUSE Bug 1252098",
"url": "https://bugzilla.suse.com/1252098"
},
{
"category": "self",
"summary": "SUSE Bug 1252388",
"url": "https://bugzilla.suse.com/1252388"
},
{
"category": "self",
"summary": "SUSE Bug 1252638",
"url": "https://bugzilla.suse.com/1252638"
},
{
"category": "self",
"summary": "SUSE Bug 1252665",
"url": "https://bugzilla.suse.com/1252665"
},
{
"category": "self",
"summary": "SUSE Bug 1252908",
"url": "https://bugzilla.suse.com/1252908"
},
{
"category": "self",
"summary": "SUSE Bug 1252937",
"url": "https://bugzilla.suse.com/1252937"
},
{
"category": "self",
"summary": "SUSE Bug 1253174",
"url": "https://bugzilla.suse.com/1253174"
},
{
"category": "self",
"summary": "SUSE Bug 1253197",
"url": "https://bugzilla.suse.com/1253197"
},
{
"category": "self",
"summary": "SUSE Bug 1253249",
"url": "https://bugzilla.suse.com/1253249"
},
{
"category": "self",
"summary": "SUSE Bug 1253285",
"url": "https://bugzilla.suse.com/1253285"
},
{
"category": "self",
"summary": "SUSE Bug 1253322",
"url": "https://bugzilla.suse.com/1253322"
},
{
"category": "self",
"summary": "SUSE Bug 1253501",
"url": "https://bugzilla.suse.com/1253501"
},
{
"category": "self",
"summary": "SUSE Bug 1253659",
"url": "https://bugzilla.suse.com/1253659"
},
{
"category": "self",
"summary": "SUSE Bug 1253660",
"url": "https://bugzilla.suse.com/1253660"
},
{
"category": "self",
"summary": "SUSE Bug 1253711",
"url": "https://bugzilla.suse.com/1253711"
},
{
"category": "self",
"summary": "SUSE Bug 1253712",
"url": "https://bugzilla.suse.com/1253712"
},
{
"category": "self",
"summary": "SUSE Bug 1253773",
"url": "https://bugzilla.suse.com/1253773"
},
{
"category": "self",
"summary": "SUSE Bug 1254251",
"url": "https://bugzilla.suse.com/1254251"
},
{
"category": "self",
"summary": "SUSE Bug 1255089",
"url": "https://bugzilla.suse.com/1255089"
},
{
"category": "self",
"summary": "SUSE Bug 1255176",
"url": "https://bugzilla.suse.com/1255176"
},
{
"category": "self",
"summary": "SUSE Bug 1255298",
"url": "https://bugzilla.suse.com/1255298"
},
{
"category": "self",
"summary": "SUSE Bug 1255634",
"url": "https://bugzilla.suse.com/1255634"
},
{
"category": "self",
"summary": "SUSE Bug 1255653",
"url": "https://bugzilla.suse.com/1255653"
},
{
"category": "self",
"summary": "SUSE Bug 1255743",
"url": "https://bugzilla.suse.com/1255743"
},
{
"category": "self",
"summary": "SUSE Bug 1255857",
"url": "https://bugzilla.suse.com/1255857"
},
{
"category": "self",
"summary": "SUSE Bug 1256991",
"url": "https://bugzilla.suse.com/1256991"
},
{
"category": "self",
"summary": "SUSE Bug 1257255",
"url": "https://bugzilla.suse.com/1257255"
},
{
"category": "self",
"summary": "SUSE Bug 1257538",
"url": "https://bugzilla.suse.com/1257538"
},
{
"category": "self",
"summary": "SUSE Bug 1257992",
"url": "https://bugzilla.suse.com/1257992"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-29371 page",
"url": "https://www.suse.com/security/cve/CVE-2024-29371/"
}
],
"title": "Security update 5.0.7 for Multi-Linux Manager Server",
"tracking": {
"current_release_date": "2026-03-25T10:10:02Z",
"generator": {
"date": "2026-03-25T10:10:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1010-1",
"initial_release_date": "2026-03-25T10:10:02Z",
"revision_history": [
{
"date": "2026-03-25T10:10:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "suse-manager-5.0-aarch64-proxy-httpd-image-5.0.7-7.30.13.aarch64",
"product": {
"name": "suse-manager-5.0-aarch64-proxy-httpd-image-5.0.7-7.30.13.aarch64",
"product_id": "suse-manager-5.0-aarch64-proxy-httpd-image-5.0.7-7.30.13.aarch64"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.7-7.32.15.aarch64",
"product": {
"name": "suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.7-7.32.15.aarch64",
"product_id": "suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.7-7.32.15.aarch64"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-aarch64-proxy-squid-image-5.0.7-7.30.6.aarch64",
"product": {
"name": "suse-manager-5.0-aarch64-proxy-squid-image-5.0.7-7.30.6.aarch64",
"product_id": "suse-manager-5.0-aarch64-proxy-squid-image-5.0.7-7.30.6.aarch64"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-aarch64-proxy-ssh-image-5.0.7-7.30.5.aarch64",
"product": {
"name": "suse-manager-5.0-aarch64-proxy-ssh-image-5.0.7-7.30.5.aarch64",
"product_id": "suse-manager-5.0-aarch64-proxy-ssh-image-5.0.7-7.30.5.aarch64"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.7-7.30.5.aarch64",
"product": {
"name": "suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.7-7.30.5.aarch64",
"product_id": "suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.7-7.30.5.aarch64"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-aarch64-server-attestation-image-5.0.7-6.34.5.aarch64",
"product": {
"name": "suse-manager-5.0-aarch64-server-attestation-image-5.0.7-6.34.5.aarch64",
"product_id": "suse-manager-5.0-aarch64-server-attestation-image-5.0.7-6.34.5.aarch64"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-aarch64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.aarch64",
"product": {
"name": "suse-manager-5.0-aarch64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.aarch64",
"product_id": "suse-manager-5.0-aarch64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.aarch64"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-aarch64-server-image-5.0.7-7.37.12.aarch64",
"product": {
"name": "suse-manager-5.0-aarch64-server-image-5.0.7-7.37.12.aarch64",
"product_id": "suse-manager-5.0-aarch64-server-image-5.0.7-7.37.12.aarch64"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-aarch64-server-migration-14-16-image-5.0.7-7.30.7.aarch64",
"product": {
"name": "suse-manager-5.0-aarch64-server-migration-14-16-image-5.0.7-7.30.7.aarch64",
"product_id": "suse-manager-5.0-aarch64-server-migration-14-16-image-5.0.7-7.30.7.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.7-7.30.13.ppc64le",
"product": {
"name": "suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.7-7.30.13.ppc64le",
"product_id": "suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.7-7.30.13.ppc64le"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.7-7.32.15.ppc64le",
"product": {
"name": "suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.7-7.32.15.ppc64le",
"product_id": "suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.7-7.32.15.ppc64le"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-ppc64le-proxy-squid-image-5.0.7-7.30.6.ppc64le",
"product": {
"name": "suse-manager-5.0-ppc64le-proxy-squid-image-5.0.7-7.30.6.ppc64le",
"product_id": "suse-manager-5.0-ppc64le-proxy-squid-image-5.0.7-7.30.6.ppc64le"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.7-7.30.5.ppc64le",
"product": {
"name": "suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.7-7.30.5.ppc64le",
"product_id": "suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.7-7.30.5.ppc64le"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.7-7.30.5.ppc64le",
"product": {
"name": "suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.7-7.30.5.ppc64le",
"product_id": "suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.7-7.30.5.ppc64le"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-ppc64le-server-attestation-image-5.0.7-6.34.5.ppc64le",
"product": {
"name": "suse-manager-5.0-ppc64le-server-attestation-image-5.0.7-6.34.5.ppc64le",
"product_id": "suse-manager-5.0-ppc64le-server-attestation-image-5.0.7-6.34.5.ppc64le"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-ppc64le-server-hub-xmlrpc-api-image-5.0.7-6.30.7.ppc64le",
"product": {
"name": "suse-manager-5.0-ppc64le-server-hub-xmlrpc-api-image-5.0.7-6.30.7.ppc64le",
"product_id": "suse-manager-5.0-ppc64le-server-hub-xmlrpc-api-image-5.0.7-6.30.7.ppc64le"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-ppc64le-server-image-5.0.7-7.37.12.ppc64le",
"product": {
"name": "suse-manager-5.0-ppc64le-server-image-5.0.7-7.37.12.ppc64le",
"product_id": "suse-manager-5.0-ppc64le-server-image-5.0.7-7.37.12.ppc64le"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-ppc64le-server-migration-14-16-image-5.0.7-7.30.7.ppc64le",
"product": {
"name": "suse-manager-5.0-ppc64le-server-migration-14-16-image-5.0.7-7.30.7.ppc64le",
"product_id": "suse-manager-5.0-ppc64le-server-migration-14-16-image-5.0.7-7.30.7.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "suse-manager-5.0-s390x-proxy-httpd-image-5.0.7-7.30.13.s390x",
"product": {
"name": "suse-manager-5.0-s390x-proxy-httpd-image-5.0.7-7.30.13.s390x",
"product_id": "suse-manager-5.0-s390x-proxy-httpd-image-5.0.7-7.30.13.s390x"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.7-7.32.15.s390x",
"product": {
"name": "suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.7-7.32.15.s390x",
"product_id": "suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.7-7.32.15.s390x"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-s390x-proxy-squid-image-5.0.7-7.30.6.s390x",
"product": {
"name": "suse-manager-5.0-s390x-proxy-squid-image-5.0.7-7.30.6.s390x",
"product_id": "suse-manager-5.0-s390x-proxy-squid-image-5.0.7-7.30.6.s390x"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-s390x-proxy-ssh-image-5.0.7-7.30.5.s390x",
"product": {
"name": "suse-manager-5.0-s390x-proxy-ssh-image-5.0.7-7.30.5.s390x",
"product_id": "suse-manager-5.0-s390x-proxy-ssh-image-5.0.7-7.30.5.s390x"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-s390x-proxy-tftpd-image-5.0.7-7.30.5.s390x",
"product": {
"name": "suse-manager-5.0-s390x-proxy-tftpd-image-5.0.7-7.30.5.s390x",
"product_id": "suse-manager-5.0-s390x-proxy-tftpd-image-5.0.7-7.30.5.s390x"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-s390x-server-attestation-image-5.0.7-6.34.5.s390x",
"product": {
"name": "suse-manager-5.0-s390x-server-attestation-image-5.0.7-6.34.5.s390x",
"product_id": "suse-manager-5.0-s390x-server-attestation-image-5.0.7-6.34.5.s390x"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-s390x-server-hub-xmlrpc-api-image-5.0.7-6.30.7.s390x",
"product": {
"name": "suse-manager-5.0-s390x-server-hub-xmlrpc-api-image-5.0.7-6.30.7.s390x",
"product_id": "suse-manager-5.0-s390x-server-hub-xmlrpc-api-image-5.0.7-6.30.7.s390x"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-s390x-server-image-5.0.7-7.37.12.s390x",
"product": {
"name": "suse-manager-5.0-s390x-server-image-5.0.7-7.37.12.s390x",
"product_id": "suse-manager-5.0-s390x-server-image-5.0.7-7.37.12.s390x"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-s390x-server-migration-14-16-image-5.0.7-7.30.7.s390x",
"product": {
"name": "suse-manager-5.0-s390x-server-migration-14-16-image-5.0.7-7.30.7.s390x",
"product_id": "suse-manager-5.0-s390x-server-migration-14-16-image-5.0.7-7.30.7.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "suse-manager-5.0-x86_64-proxy-httpd-image-5.0.7-7.30.13.x86_64",
"product": {
"name": "suse-manager-5.0-x86_64-proxy-httpd-image-5.0.7-7.30.13.x86_64",
"product_id": "suse-manager-5.0-x86_64-proxy-httpd-image-5.0.7-7.30.13.x86_64"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.7-7.32.15.x86_64",
"product": {
"name": "suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.7-7.32.15.x86_64",
"product_id": "suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.7-7.32.15.x86_64"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-x86_64-proxy-squid-image-5.0.7-7.30.6.x86_64",
"product": {
"name": "suse-manager-5.0-x86_64-proxy-squid-image-5.0.7-7.30.6.x86_64",
"product_id": "suse-manager-5.0-x86_64-proxy-squid-image-5.0.7-7.30.6.x86_64"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-x86_64-proxy-ssh-image-5.0.7-7.30.5.x86_64",
"product": {
"name": "suse-manager-5.0-x86_64-proxy-ssh-image-5.0.7-7.30.5.x86_64",
"product_id": "suse-manager-5.0-x86_64-proxy-ssh-image-5.0.7-7.30.5.x86_64"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.7-7.30.5.x86_64",
"product": {
"name": "suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.7-7.30.5.x86_64",
"product_id": "suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.7-7.30.5.x86_64"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-x86_64-server-attestation-image-5.0.7-6.34.5.x86_64",
"product": {
"name": "suse-manager-5.0-x86_64-server-attestation-image-5.0.7-6.34.5.x86_64",
"product_id": "suse-manager-5.0-x86_64-server-attestation-image-5.0.7-6.34.5.x86_64"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-x86_64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.x86_64",
"product": {
"name": "suse-manager-5.0-x86_64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.x86_64",
"product_id": "suse-manager-5.0-x86_64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.x86_64"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-x86_64-server-image-5.0.7-7.37.12.x86_64",
"product": {
"name": "suse-manager-5.0-x86_64-server-image-5.0.7-7.37.12.x86_64",
"product_id": "suse-manager-5.0-x86_64-server-image-5.0.7-7.37.12.x86_64"
}
},
{
"category": "product_version",
"name": "suse-manager-5.0-x86_64-server-migration-14-16-image-5.0.7-7.30.7.x86_64",
"product": {
"name": "suse-manager-5.0-x86_64-server-migration-14-16-image-5.0.7-7.30.7.x86_64",
"product_id": "suse-manager-5.0-x86_64-server-migration-14-16-image-5.0.7-7.30.7.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Manager Proxy 5.0",
"product": {
"name": "SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:5.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Retail Branch Server Extension 5.0",
"product": {
"name": "SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0"
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 5.0",
"product": {
"name": "SUSE Manager Server 5.0",
"product_id": "SUSE Manager Server 5.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:5.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-aarch64-proxy-httpd-image-5.0.7-7.30.13.aarch64 as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-httpd-image-5.0.7-7.30.13.aarch64"
},
"product_reference": "suse-manager-5.0-aarch64-proxy-httpd-image-5.0.7-7.30.13.aarch64",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.7-7.32.15.aarch64 as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.7-7.32.15.aarch64"
},
"product_reference": "suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.7-7.32.15.aarch64",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-aarch64-proxy-squid-image-5.0.7-7.30.6.aarch64 as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-squid-image-5.0.7-7.30.6.aarch64"
},
"product_reference": "suse-manager-5.0-aarch64-proxy-squid-image-5.0.7-7.30.6.aarch64",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-aarch64-proxy-ssh-image-5.0.7-7.30.5.aarch64 as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-ssh-image-5.0.7-7.30.5.aarch64"
},
"product_reference": "suse-manager-5.0-aarch64-proxy-ssh-image-5.0.7-7.30.5.aarch64",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.7-7.30.5.aarch64 as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.7-7.30.5.aarch64"
},
"product_reference": "suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.7-7.30.5.aarch64",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.7-7.30.13.ppc64le as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.7-7.30.13.ppc64le"
},
"product_reference": "suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.7-7.30.13.ppc64le",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.7-7.32.15.ppc64le as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.7-7.32.15.ppc64le"
},
"product_reference": "suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.7-7.32.15.ppc64le",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-ppc64le-proxy-squid-image-5.0.7-7.30.6.ppc64le as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-squid-image-5.0.7-7.30.6.ppc64le"
},
"product_reference": "suse-manager-5.0-ppc64le-proxy-squid-image-5.0.7-7.30.6.ppc64le",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.7-7.30.5.ppc64le as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.7-7.30.5.ppc64le"
},
"product_reference": "suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.7-7.30.5.ppc64le",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.7-7.30.5.ppc64le as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.7-7.30.5.ppc64le"
},
"product_reference": "suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.7-7.30.5.ppc64le",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-s390x-proxy-httpd-image-5.0.7-7.30.13.s390x as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-httpd-image-5.0.7-7.30.13.s390x"
},
"product_reference": "suse-manager-5.0-s390x-proxy-httpd-image-5.0.7-7.30.13.s390x",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.7-7.32.15.s390x as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.7-7.32.15.s390x"
},
"product_reference": "suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.7-7.32.15.s390x",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-s390x-proxy-squid-image-5.0.7-7.30.6.s390x as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-squid-image-5.0.7-7.30.6.s390x"
},
"product_reference": "suse-manager-5.0-s390x-proxy-squid-image-5.0.7-7.30.6.s390x",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-s390x-proxy-ssh-image-5.0.7-7.30.5.s390x as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-ssh-image-5.0.7-7.30.5.s390x"
},
"product_reference": "suse-manager-5.0-s390x-proxy-ssh-image-5.0.7-7.30.5.s390x",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-s390x-proxy-tftpd-image-5.0.7-7.30.5.s390x as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-tftpd-image-5.0.7-7.30.5.s390x"
},
"product_reference": "suse-manager-5.0-s390x-proxy-tftpd-image-5.0.7-7.30.5.s390x",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-x86_64-proxy-httpd-image-5.0.7-7.30.13.x86_64 as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-httpd-image-5.0.7-7.30.13.x86_64"
},
"product_reference": "suse-manager-5.0-x86_64-proxy-httpd-image-5.0.7-7.30.13.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.7-7.32.15.x86_64 as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.7-7.32.15.x86_64"
},
"product_reference": "suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.7-7.32.15.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-x86_64-proxy-squid-image-5.0.7-7.30.6.x86_64 as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-squid-image-5.0.7-7.30.6.x86_64"
},
"product_reference": "suse-manager-5.0-x86_64-proxy-squid-image-5.0.7-7.30.6.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-x86_64-proxy-ssh-image-5.0.7-7.30.5.x86_64 as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-ssh-image-5.0.7-7.30.5.x86_64"
},
"product_reference": "suse-manager-5.0-x86_64-proxy-ssh-image-5.0.7-7.30.5.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.7-7.30.5.x86_64 as component of SUSE Manager Proxy 5.0",
"product_id": "SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.7-7.30.5.x86_64"
},
"product_reference": "suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.7-7.30.5.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-aarch64-proxy-httpd-image-5.0.7-7.30.13.aarch64 as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-httpd-image-5.0.7-7.30.13.aarch64"
},
"product_reference": "suse-manager-5.0-aarch64-proxy-httpd-image-5.0.7-7.30.13.aarch64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.7-7.32.15.aarch64 as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.7-7.32.15.aarch64"
},
"product_reference": "suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.7-7.32.15.aarch64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-aarch64-proxy-squid-image-5.0.7-7.30.6.aarch64 as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-squid-image-5.0.7-7.30.6.aarch64"
},
"product_reference": "suse-manager-5.0-aarch64-proxy-squid-image-5.0.7-7.30.6.aarch64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-aarch64-proxy-ssh-image-5.0.7-7.30.5.aarch64 as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-ssh-image-5.0.7-7.30.5.aarch64"
},
"product_reference": "suse-manager-5.0-aarch64-proxy-ssh-image-5.0.7-7.30.5.aarch64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.7-7.30.5.aarch64 as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.7-7.30.5.aarch64"
},
"product_reference": "suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.7-7.30.5.aarch64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.7-7.30.13.ppc64le as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.7-7.30.13.ppc64le"
},
"product_reference": "suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.7-7.30.13.ppc64le",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.7-7.32.15.ppc64le as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.7-7.32.15.ppc64le"
},
"product_reference": "suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.7-7.32.15.ppc64le",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-ppc64le-proxy-squid-image-5.0.7-7.30.6.ppc64le as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-squid-image-5.0.7-7.30.6.ppc64le"
},
"product_reference": "suse-manager-5.0-ppc64le-proxy-squid-image-5.0.7-7.30.6.ppc64le",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.7-7.30.5.ppc64le as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.7-7.30.5.ppc64le"
},
"product_reference": "suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.7-7.30.5.ppc64le",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.7-7.30.5.ppc64le as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.7-7.30.5.ppc64le"
},
"product_reference": "suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.7-7.30.5.ppc64le",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-s390x-proxy-httpd-image-5.0.7-7.30.13.s390x as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-httpd-image-5.0.7-7.30.13.s390x"
},
"product_reference": "suse-manager-5.0-s390x-proxy-httpd-image-5.0.7-7.30.13.s390x",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.7-7.32.15.s390x as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.7-7.32.15.s390x"
},
"product_reference": "suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.7-7.32.15.s390x",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-s390x-proxy-squid-image-5.0.7-7.30.6.s390x as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-squid-image-5.0.7-7.30.6.s390x"
},
"product_reference": "suse-manager-5.0-s390x-proxy-squid-image-5.0.7-7.30.6.s390x",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-s390x-proxy-ssh-image-5.0.7-7.30.5.s390x as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-ssh-image-5.0.7-7.30.5.s390x"
},
"product_reference": "suse-manager-5.0-s390x-proxy-ssh-image-5.0.7-7.30.5.s390x",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-s390x-proxy-tftpd-image-5.0.7-7.30.5.s390x as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-tftpd-image-5.0.7-7.30.5.s390x"
},
"product_reference": "suse-manager-5.0-s390x-proxy-tftpd-image-5.0.7-7.30.5.s390x",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-x86_64-proxy-httpd-image-5.0.7-7.30.13.x86_64 as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-httpd-image-5.0.7-7.30.13.x86_64"
},
"product_reference": "suse-manager-5.0-x86_64-proxy-httpd-image-5.0.7-7.30.13.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.7-7.32.15.x86_64 as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.7-7.32.15.x86_64"
},
"product_reference": "suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.7-7.32.15.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-x86_64-proxy-squid-image-5.0.7-7.30.6.x86_64 as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-squid-image-5.0.7-7.30.6.x86_64"
},
"product_reference": "suse-manager-5.0-x86_64-proxy-squid-image-5.0.7-7.30.6.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-x86_64-proxy-ssh-image-5.0.7-7.30.5.x86_64 as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-ssh-image-5.0.7-7.30.5.x86_64"
},
"product_reference": "suse-manager-5.0-x86_64-proxy-ssh-image-5.0.7-7.30.5.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.7-7.30.5.x86_64 as component of SUSE Manager Retail Branch Server Extension 5.0",
"product_id": "SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.7-7.30.5.x86_64"
},
"product_reference": "suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.7-7.30.5.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server Extension 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-aarch64-server-attestation-image-5.0.7-6.34.5.aarch64 as component of SUSE Manager Server 5.0",
"product_id": "SUSE Manager Server 5.0:suse-manager-5.0-aarch64-server-attestation-image-5.0.7-6.34.5.aarch64"
},
"product_reference": "suse-manager-5.0-aarch64-server-attestation-image-5.0.7-6.34.5.aarch64",
"relates_to_product_reference": "SUSE Manager Server 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-aarch64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.aarch64 as component of SUSE Manager Server 5.0",
"product_id": "SUSE Manager Server 5.0:suse-manager-5.0-aarch64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.aarch64"
},
"product_reference": "suse-manager-5.0-aarch64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.aarch64",
"relates_to_product_reference": "SUSE Manager Server 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-aarch64-server-image-5.0.7-7.37.12.aarch64 as component of SUSE Manager Server 5.0",
"product_id": "SUSE Manager Server 5.0:suse-manager-5.0-aarch64-server-image-5.0.7-7.37.12.aarch64"
},
"product_reference": "suse-manager-5.0-aarch64-server-image-5.0.7-7.37.12.aarch64",
"relates_to_product_reference": "SUSE Manager Server 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-aarch64-server-migration-14-16-image-5.0.7-7.30.7.aarch64 as component of SUSE Manager Server 5.0",
"product_id": "SUSE Manager Server 5.0:suse-manager-5.0-aarch64-server-migration-14-16-image-5.0.7-7.30.7.aarch64"
},
"product_reference": "suse-manager-5.0-aarch64-server-migration-14-16-image-5.0.7-7.30.7.aarch64",
"relates_to_product_reference": "SUSE Manager Server 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-ppc64le-server-attestation-image-5.0.7-6.34.5.ppc64le as component of SUSE Manager Server 5.0",
"product_id": "SUSE Manager Server 5.0:suse-manager-5.0-ppc64le-server-attestation-image-5.0.7-6.34.5.ppc64le"
},
"product_reference": "suse-manager-5.0-ppc64le-server-attestation-image-5.0.7-6.34.5.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-ppc64le-server-hub-xmlrpc-api-image-5.0.7-6.30.7.ppc64le as component of SUSE Manager Server 5.0",
"product_id": "SUSE Manager Server 5.0:suse-manager-5.0-ppc64le-server-hub-xmlrpc-api-image-5.0.7-6.30.7.ppc64le"
},
"product_reference": "suse-manager-5.0-ppc64le-server-hub-xmlrpc-api-image-5.0.7-6.30.7.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-ppc64le-server-image-5.0.7-7.37.12.ppc64le as component of SUSE Manager Server 5.0",
"product_id": "SUSE Manager Server 5.0:suse-manager-5.0-ppc64le-server-image-5.0.7-7.37.12.ppc64le"
},
"product_reference": "suse-manager-5.0-ppc64le-server-image-5.0.7-7.37.12.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-ppc64le-server-migration-14-16-image-5.0.7-7.30.7.ppc64le as component of SUSE Manager Server 5.0",
"product_id": "SUSE Manager Server 5.0:suse-manager-5.0-ppc64le-server-migration-14-16-image-5.0.7-7.30.7.ppc64le"
},
"product_reference": "suse-manager-5.0-ppc64le-server-migration-14-16-image-5.0.7-7.30.7.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-s390x-server-attestation-image-5.0.7-6.34.5.s390x as component of SUSE Manager Server 5.0",
"product_id": "SUSE Manager Server 5.0:suse-manager-5.0-s390x-server-attestation-image-5.0.7-6.34.5.s390x"
},
"product_reference": "suse-manager-5.0-s390x-server-attestation-image-5.0.7-6.34.5.s390x",
"relates_to_product_reference": "SUSE Manager Server 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-s390x-server-hub-xmlrpc-api-image-5.0.7-6.30.7.s390x as component of SUSE Manager Server 5.0",
"product_id": "SUSE Manager Server 5.0:suse-manager-5.0-s390x-server-hub-xmlrpc-api-image-5.0.7-6.30.7.s390x"
},
"product_reference": "suse-manager-5.0-s390x-server-hub-xmlrpc-api-image-5.0.7-6.30.7.s390x",
"relates_to_product_reference": "SUSE Manager Server 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-s390x-server-image-5.0.7-7.37.12.s390x as component of SUSE Manager Server 5.0",
"product_id": "SUSE Manager Server 5.0:suse-manager-5.0-s390x-server-image-5.0.7-7.37.12.s390x"
},
"product_reference": "suse-manager-5.0-s390x-server-image-5.0.7-7.37.12.s390x",
"relates_to_product_reference": "SUSE Manager Server 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-s390x-server-migration-14-16-image-5.0.7-7.30.7.s390x as component of SUSE Manager Server 5.0",
"product_id": "SUSE Manager Server 5.0:suse-manager-5.0-s390x-server-migration-14-16-image-5.0.7-7.30.7.s390x"
},
"product_reference": "suse-manager-5.0-s390x-server-migration-14-16-image-5.0.7-7.30.7.s390x",
"relates_to_product_reference": "SUSE Manager Server 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-x86_64-server-attestation-image-5.0.7-6.34.5.x86_64 as component of SUSE Manager Server 5.0",
"product_id": "SUSE Manager Server 5.0:suse-manager-5.0-x86_64-server-attestation-image-5.0.7-6.34.5.x86_64"
},
"product_reference": "suse-manager-5.0-x86_64-server-attestation-image-5.0.7-6.34.5.x86_64",
"relates_to_product_reference": "SUSE Manager Server 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-x86_64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.x86_64 as component of SUSE Manager Server 5.0",
"product_id": "SUSE Manager Server 5.0:suse-manager-5.0-x86_64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.x86_64"
},
"product_reference": "suse-manager-5.0-x86_64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.x86_64",
"relates_to_product_reference": "SUSE Manager Server 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-x86_64-server-image-5.0.7-7.37.12.x86_64 as component of SUSE Manager Server 5.0",
"product_id": "SUSE Manager Server 5.0:suse-manager-5.0-x86_64-server-image-5.0.7-7.37.12.x86_64"
},
"product_reference": "suse-manager-5.0-x86_64-server-image-5.0.7-7.37.12.x86_64",
"relates_to_product_reference": "SUSE Manager Server 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-manager-5.0-x86_64-server-migration-14-16-image-5.0.7-7.30.7.x86_64 as component of SUSE Manager Server 5.0",
"product_id": "SUSE Manager Server 5.0:suse-manager-5.0-x86_64-server-migration-14-16-image-5.0.7-7.30.7.x86_64"
},
"product_reference": "suse-manager-5.0-x86_64-server-migration-14-16-image-5.0.7-7.30.7.x86_64",
"relates_to_product_reference": "SUSE Manager Server 5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-29371",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-29371"
}
],
"notes": [
{
"category": "general",
"text": "In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-httpd-image-5.0.7-7.30.13.aarch64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.7-7.32.15.aarch64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-squid-image-5.0.7-7.30.6.aarch64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-ssh-image-5.0.7-7.30.5.aarch64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.7-7.30.5.aarch64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.7-7.30.13.ppc64le",
"SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.7-7.32.15.ppc64le",
"SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-squid-image-5.0.7-7.30.6.ppc64le",
"SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.7-7.30.5.ppc64le",
"SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.7-7.30.5.ppc64le",
"SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-httpd-image-5.0.7-7.30.13.s390x",
"SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.7-7.32.15.s390x",
"SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-squid-image-5.0.7-7.30.6.s390x",
"SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-ssh-image-5.0.7-7.30.5.s390x",
"SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-tftpd-image-5.0.7-7.30.5.s390x",
"SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-httpd-image-5.0.7-7.30.13.x86_64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.7-7.32.15.x86_64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-squid-image-5.0.7-7.30.6.x86_64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-ssh-image-5.0.7-7.30.5.x86_64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.7-7.30.5.x86_64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-httpd-image-5.0.7-7.30.13.aarch64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.7-7.32.15.aarch64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-squid-image-5.0.7-7.30.6.aarch64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-ssh-image-5.0.7-7.30.5.aarch64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.7-7.30.5.aarch64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.7-7.30.13.ppc64le",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.7-7.32.15.ppc64le",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-squid-image-5.0.7-7.30.6.ppc64le",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.7-7.30.5.ppc64le",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.7-7.30.5.ppc64le",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-httpd-image-5.0.7-7.30.13.s390x",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.7-7.32.15.s390x",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-squid-image-5.0.7-7.30.6.s390x",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-ssh-image-5.0.7-7.30.5.s390x",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-tftpd-image-5.0.7-7.30.5.s390x",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-httpd-image-5.0.7-7.30.13.x86_64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.7-7.32.15.x86_64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-squid-image-5.0.7-7.30.6.x86_64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-ssh-image-5.0.7-7.30.5.x86_64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.7-7.30.5.x86_64",
"SUSE Manager Server 5.0:suse-manager-5.0-aarch64-server-attestation-image-5.0.7-6.34.5.aarch64",
"SUSE Manager Server 5.0:suse-manager-5.0-aarch64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.aarch64",
"SUSE Manager Server 5.0:suse-manager-5.0-aarch64-server-image-5.0.7-7.37.12.aarch64",
"SUSE Manager Server 5.0:suse-manager-5.0-aarch64-server-migration-14-16-image-5.0.7-7.30.7.aarch64",
"SUSE Manager Server 5.0:suse-manager-5.0-ppc64le-server-attestation-image-5.0.7-6.34.5.ppc64le",
"SUSE Manager Server 5.0:suse-manager-5.0-ppc64le-server-hub-xmlrpc-api-image-5.0.7-6.30.7.ppc64le",
"SUSE Manager Server 5.0:suse-manager-5.0-ppc64le-server-image-5.0.7-7.37.12.ppc64le",
"SUSE Manager Server 5.0:suse-manager-5.0-ppc64le-server-migration-14-16-image-5.0.7-7.30.7.ppc64le",
"SUSE Manager Server 5.0:suse-manager-5.0-s390x-server-attestation-image-5.0.7-6.34.5.s390x",
"SUSE Manager Server 5.0:suse-manager-5.0-s390x-server-hub-xmlrpc-api-image-5.0.7-6.30.7.s390x",
"SUSE Manager Server 5.0:suse-manager-5.0-s390x-server-image-5.0.7-7.37.12.s390x",
"SUSE Manager Server 5.0:suse-manager-5.0-s390x-server-migration-14-16-image-5.0.7-7.30.7.s390x",
"SUSE Manager Server 5.0:suse-manager-5.0-x86_64-server-attestation-image-5.0.7-6.34.5.x86_64",
"SUSE Manager Server 5.0:suse-manager-5.0-x86_64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.x86_64",
"SUSE Manager Server 5.0:suse-manager-5.0-x86_64-server-image-5.0.7-7.37.12.x86_64",
"SUSE Manager Server 5.0:suse-manager-5.0-x86_64-server-migration-14-16-image-5.0.7-7.30.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-29371",
"url": "https://www.suse.com/security/cve/CVE-2024-29371"
},
{
"category": "external",
"summary": "SUSE Bug 1255298 for CVE-2024-29371",
"url": "https://bugzilla.suse.com/1255298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-httpd-image-5.0.7-7.30.13.aarch64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.7-7.32.15.aarch64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-squid-image-5.0.7-7.30.6.aarch64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-ssh-image-5.0.7-7.30.5.aarch64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.7-7.30.5.aarch64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.7-7.30.13.ppc64le",
"SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.7-7.32.15.ppc64le",
"SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-squid-image-5.0.7-7.30.6.ppc64le",
"SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.7-7.30.5.ppc64le",
"SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.7-7.30.5.ppc64le",
"SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-httpd-image-5.0.7-7.30.13.s390x",
"SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.7-7.32.15.s390x",
"SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-squid-image-5.0.7-7.30.6.s390x",
"SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-ssh-image-5.0.7-7.30.5.s390x",
"SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-tftpd-image-5.0.7-7.30.5.s390x",
"SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-httpd-image-5.0.7-7.30.13.x86_64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.7-7.32.15.x86_64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-squid-image-5.0.7-7.30.6.x86_64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-ssh-image-5.0.7-7.30.5.x86_64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.7-7.30.5.x86_64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-httpd-image-5.0.7-7.30.13.aarch64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.7-7.32.15.aarch64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-squid-image-5.0.7-7.30.6.aarch64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-ssh-image-5.0.7-7.30.5.aarch64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.7-7.30.5.aarch64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.7-7.30.13.ppc64le",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.7-7.32.15.ppc64le",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-squid-image-5.0.7-7.30.6.ppc64le",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.7-7.30.5.ppc64le",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.7-7.30.5.ppc64le",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-httpd-image-5.0.7-7.30.13.s390x",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.7-7.32.15.s390x",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-squid-image-5.0.7-7.30.6.s390x",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-ssh-image-5.0.7-7.30.5.s390x",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-tftpd-image-5.0.7-7.30.5.s390x",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-httpd-image-5.0.7-7.30.13.x86_64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.7-7.32.15.x86_64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-squid-image-5.0.7-7.30.6.x86_64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-ssh-image-5.0.7-7.30.5.x86_64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.7-7.30.5.x86_64",
"SUSE Manager Server 5.0:suse-manager-5.0-aarch64-server-attestation-image-5.0.7-6.34.5.aarch64",
"SUSE Manager Server 5.0:suse-manager-5.0-aarch64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.aarch64",
"SUSE Manager Server 5.0:suse-manager-5.0-aarch64-server-image-5.0.7-7.37.12.aarch64",
"SUSE Manager Server 5.0:suse-manager-5.0-aarch64-server-migration-14-16-image-5.0.7-7.30.7.aarch64",
"SUSE Manager Server 5.0:suse-manager-5.0-ppc64le-server-attestation-image-5.0.7-6.34.5.ppc64le",
"SUSE Manager Server 5.0:suse-manager-5.0-ppc64le-server-hub-xmlrpc-api-image-5.0.7-6.30.7.ppc64le",
"SUSE Manager Server 5.0:suse-manager-5.0-ppc64le-server-image-5.0.7-7.37.12.ppc64le",
"SUSE Manager Server 5.0:suse-manager-5.0-ppc64le-server-migration-14-16-image-5.0.7-7.30.7.ppc64le",
"SUSE Manager Server 5.0:suse-manager-5.0-s390x-server-attestation-image-5.0.7-6.34.5.s390x",
"SUSE Manager Server 5.0:suse-manager-5.0-s390x-server-hub-xmlrpc-api-image-5.0.7-6.30.7.s390x",
"SUSE Manager Server 5.0:suse-manager-5.0-s390x-server-image-5.0.7-7.37.12.s390x",
"SUSE Manager Server 5.0:suse-manager-5.0-s390x-server-migration-14-16-image-5.0.7-7.30.7.s390x",
"SUSE Manager Server 5.0:suse-manager-5.0-x86_64-server-attestation-image-5.0.7-6.34.5.x86_64",
"SUSE Manager Server 5.0:suse-manager-5.0-x86_64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.x86_64",
"SUSE Manager Server 5.0:suse-manager-5.0-x86_64-server-image-5.0.7-7.37.12.x86_64",
"SUSE Manager Server 5.0:suse-manager-5.0-x86_64-server-migration-14-16-image-5.0.7-7.30.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-httpd-image-5.0.7-7.30.13.aarch64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.7-7.32.15.aarch64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-squid-image-5.0.7-7.30.6.aarch64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-ssh-image-5.0.7-7.30.5.aarch64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.7-7.30.5.aarch64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.7-7.30.13.ppc64le",
"SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.7-7.32.15.ppc64le",
"SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-squid-image-5.0.7-7.30.6.ppc64le",
"SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.7-7.30.5.ppc64le",
"SUSE Manager Proxy 5.0:suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.7-7.30.5.ppc64le",
"SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-httpd-image-5.0.7-7.30.13.s390x",
"SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.7-7.32.15.s390x",
"SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-squid-image-5.0.7-7.30.6.s390x",
"SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-ssh-image-5.0.7-7.30.5.s390x",
"SUSE Manager Proxy 5.0:suse-manager-5.0-s390x-proxy-tftpd-image-5.0.7-7.30.5.s390x",
"SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-httpd-image-5.0.7-7.30.13.x86_64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.7-7.32.15.x86_64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-squid-image-5.0.7-7.30.6.x86_64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-ssh-image-5.0.7-7.30.5.x86_64",
"SUSE Manager Proxy 5.0:suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.7-7.30.5.x86_64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-httpd-image-5.0.7-7.30.13.aarch64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.7-7.32.15.aarch64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-squid-image-5.0.7-7.30.6.aarch64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-ssh-image-5.0.7-7.30.5.aarch64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.7-7.30.5.aarch64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.7-7.30.13.ppc64le",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.7-7.32.15.ppc64le",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-squid-image-5.0.7-7.30.6.ppc64le",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.7-7.30.5.ppc64le",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.7-7.30.5.ppc64le",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-httpd-image-5.0.7-7.30.13.s390x",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.7-7.32.15.s390x",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-squid-image-5.0.7-7.30.6.s390x",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-ssh-image-5.0.7-7.30.5.s390x",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-s390x-proxy-tftpd-image-5.0.7-7.30.5.s390x",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-httpd-image-5.0.7-7.30.13.x86_64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.7-7.32.15.x86_64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-squid-image-5.0.7-7.30.6.x86_64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-ssh-image-5.0.7-7.30.5.x86_64",
"SUSE Manager Retail Branch Server Extension 5.0:suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.7-7.30.5.x86_64",
"SUSE Manager Server 5.0:suse-manager-5.0-aarch64-server-attestation-image-5.0.7-6.34.5.aarch64",
"SUSE Manager Server 5.0:suse-manager-5.0-aarch64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.aarch64",
"SUSE Manager Server 5.0:suse-manager-5.0-aarch64-server-image-5.0.7-7.37.12.aarch64",
"SUSE Manager Server 5.0:suse-manager-5.0-aarch64-server-migration-14-16-image-5.0.7-7.30.7.aarch64",
"SUSE Manager Server 5.0:suse-manager-5.0-ppc64le-server-attestation-image-5.0.7-6.34.5.ppc64le",
"SUSE Manager Server 5.0:suse-manager-5.0-ppc64le-server-hub-xmlrpc-api-image-5.0.7-6.30.7.ppc64le",
"SUSE Manager Server 5.0:suse-manager-5.0-ppc64le-server-image-5.0.7-7.37.12.ppc64le",
"SUSE Manager Server 5.0:suse-manager-5.0-ppc64le-server-migration-14-16-image-5.0.7-7.30.7.ppc64le",
"SUSE Manager Server 5.0:suse-manager-5.0-s390x-server-attestation-image-5.0.7-6.34.5.s390x",
"SUSE Manager Server 5.0:suse-manager-5.0-s390x-server-hub-xmlrpc-api-image-5.0.7-6.30.7.s390x",
"SUSE Manager Server 5.0:suse-manager-5.0-s390x-server-image-5.0.7-7.37.12.s390x",
"SUSE Manager Server 5.0:suse-manager-5.0-s390x-server-migration-14-16-image-5.0.7-7.30.7.s390x",
"SUSE Manager Server 5.0:suse-manager-5.0-x86_64-server-attestation-image-5.0.7-6.34.5.x86_64",
"SUSE Manager Server 5.0:suse-manager-5.0-x86_64-server-hub-xmlrpc-api-image-5.0.7-6.30.7.x86_64",
"SUSE Manager Server 5.0:suse-manager-5.0-x86_64-server-image-5.0.7-7.37.12.x86_64",
"SUSE Manager Server 5.0:suse-manager-5.0-x86_64-server-migration-14-16-image-5.0.7-7.30.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T10:10:02Z",
"details": "important"
}
],
"title": "CVE-2024-29371"
}
]
}
FKIE_CVE-2024-29371
Vulnerability from fkie_nvd - Published: 2025-12-17 16:16 - Updated: 2026-01-23 20:15| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack | Exploit, Issue Tracking, Mitigation | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack | Exploit, Issue Tracking, Mitigation |
| Vendor | Product | Version | |
|---|---|---|---|
| jose4j_project | jose4j | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jose4j_project:jose4j:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DE62FF6D-FC62-42B0-9ED4-76A0C4419975",
"versionEndExcluding": "0.9.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression."
}
],
"id": "CVE-2024-29371",
"lastModified": "2026-01-23T20:15:51.650",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-12-17T16:16:04.567",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation"
],
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation"
],
"url": "https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1259"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
BDU:2026-01020
Vulnerability from fstec - Published: 05.03.2024{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., Fedora Project, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (OpenShift Developer Tools and Services), - (OpenShift Serverless), 2 (Red Hat build of Apicurio Registry), 42 (Fedora), 43 (Fedora), 8.0 (\u0420\u0415\u0414 \u041e\u0421), \u0434\u043e 4.1.1 (apache-kafka), \u0414\u043e 0.9.6 (Jose4j), 3 (Red Hat build of Apicurio Registry)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Jose4j:\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0439 0.9.6:\n\nhttps://bitbucket.org/b_c/jose4j/commits/19a90a64c47b\n\n\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\n\nhttps://access.redhat.com/security/cve/cve-2024-29371\n\n\n\n\u0414\u043b\u044f Fedora:\n\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-29371\n\n\n\n\u0414\u043b\u044f \u0420\u0435\u0434 \u041e\u0421:\n\nhttp://repo.red-soft.ru/redos/8.0/x86_64/updates/",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "05.03.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "30.01.2026",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "30.01.2026",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2026-01020",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-29371",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "OpenShift Developer Tools and Services, OpenShift Serverless, Red Hat build of Apicurio Registry, Fedora, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), apache-kafka, Jose4j",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Fedora Project Fedora 42 , Fedora Project Fedora 43 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 8.0 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c JWT-\u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Jose4j, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u0437\u0430\u0449\u0438\u0442\u043e\u0439 \u0442\u043e\u043a\u0435\u043d\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u044f \u0442\u043e\u043a\u0435\u043d\u0430 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (CWE-1259)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c JWT-\u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Jose4j \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u0437\u0430\u0449\u0438\u0442\u043e\u0439 \u0442\u043e\u043a\u0435\u043d\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://bitbucket.org/b_c/jose4j/commits/19a90a64c47bb07c4aa5462f1316d5c293d81fcf\n\nhttps://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack\n\nhttps://bitbucket.org/b_c/jose4j/commits/19a90a64c47b\n\nhttps://bitbucket.org/b_c/jose4j/wiki/Home\n\nhttps://redos.red-soft.ru/support/secure/\n\nhttps://access.redhat.com/security/cve/cve-2024-29371\n\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-29371",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-1259",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.